Feb 9 10:27:19.719983 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 10:27:19.720001 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 10:27:19.720008 kernel: efi: EFI v2.70 by EDK II Feb 9 10:27:19.720014 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Feb 9 10:27:19.720019 kernel: random: crng init done Feb 9 10:27:19.720024 kernel: ACPI: Early table checksum verification disabled Feb 9 10:27:19.720031 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Feb 9 10:27:19.720037 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Feb 9 10:27:19.720043 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720048 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720053 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720059 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720064 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720069 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720077 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720082 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720088 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:27:19.720094 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Feb 9 10:27:19.720100 kernel: NUMA: Failed to initialise from firmware Feb 9 10:27:19.720105 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:27:19.720111 kernel: NUMA: NODE_DATA [mem 0xdcb0c900-0xdcb11fff] Feb 9 10:27:19.720117 kernel: Zone ranges: Feb 9 10:27:19.720122 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:27:19.720129 kernel: DMA32 empty Feb 9 10:27:19.720135 kernel: Normal empty Feb 9 10:27:19.720140 kernel: Movable zone start for each node Feb 9 10:27:19.720146 kernel: Early memory node ranges Feb 9 10:27:19.720151 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Feb 9 10:27:19.720157 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Feb 9 10:27:19.720163 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Feb 9 10:27:19.720168 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Feb 9 10:27:19.720174 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Feb 9 10:27:19.720180 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Feb 9 10:27:19.720185 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Feb 9 10:27:19.720191 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:27:19.720198 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Feb 9 10:27:19.720203 kernel: psci: probing for conduit method from ACPI. Feb 9 10:27:19.720209 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 10:27:19.720215 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 10:27:19.720220 kernel: psci: Trusted OS migration not required Feb 9 10:27:19.720228 kernel: psci: SMC Calling Convention v1.1 Feb 9 10:27:19.720235 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Feb 9 10:27:19.720242 kernel: ACPI: SRAT not present Feb 9 10:27:19.720248 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 10:27:19.720254 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 10:27:19.720260 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Feb 9 10:27:19.720266 kernel: Detected PIPT I-cache on CPU0 Feb 9 10:27:19.720272 kernel: CPU features: detected: GIC system register CPU interface Feb 9 10:27:19.720278 kernel: CPU features: detected: Hardware dirty bit management Feb 9 10:27:19.720284 kernel: CPU features: detected: Spectre-v4 Feb 9 10:27:19.720290 kernel: CPU features: detected: Spectre-BHB Feb 9 10:27:19.720297 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 10:27:19.720303 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 10:27:19.720309 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 10:27:19.720334 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Feb 9 10:27:19.720340 kernel: Policy zone: DMA Feb 9 10:27:19.720347 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:27:19.720354 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 10:27:19.720360 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 10:27:19.720366 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:27:19.720372 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 10:27:19.720378 kernel: Memory: 2459156K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113132K reserved, 0K cma-reserved) Feb 9 10:27:19.720386 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 10:27:19.720392 kernel: trace event string verifier disabled Feb 9 10:27:19.720398 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 10:27:19.720405 kernel: rcu: RCU event tracing is enabled. Feb 9 10:27:19.720411 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 10:27:19.720417 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 10:27:19.720423 kernel: Tracing variant of Tasks RCU enabled. Feb 9 10:27:19.720429 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 10:27:19.720435 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 10:27:19.720441 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 10:27:19.720448 kernel: GICv3: 256 SPIs implemented Feb 9 10:27:19.720455 kernel: GICv3: 0 Extended SPIs implemented Feb 9 10:27:19.720461 kernel: GICv3: Distributor has no Range Selector support Feb 9 10:27:19.720467 kernel: Root IRQ handler: gic_handle_irq Feb 9 10:27:19.720473 kernel: GICv3: 16 PPIs implemented Feb 9 10:27:19.720479 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Feb 9 10:27:19.720485 kernel: ACPI: SRAT not present Feb 9 10:27:19.720491 kernel: ITS [mem 0x08080000-0x0809ffff] Feb 9 10:27:19.720497 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Feb 9 10:27:19.720503 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Feb 9 10:27:19.720509 kernel: GICv3: using LPI property table @0x00000000400d0000 Feb 9 10:27:19.720515 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Feb 9 10:27:19.720521 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:27:19.720528 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 10:27:19.720534 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 10:27:19.720540 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 10:27:19.720546 kernel: arm-pv: using stolen time PV Feb 9 10:27:19.720553 kernel: Console: colour dummy device 80x25 Feb 9 10:27:19.720559 kernel: ACPI: Core revision 20210730 Feb 9 10:27:19.720565 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 10:27:19.720572 kernel: pid_max: default: 32768 minimum: 301 Feb 9 10:27:19.720578 kernel: LSM: Security Framework initializing Feb 9 10:27:19.720589 kernel: SELinux: Initializing. Feb 9 10:27:19.720597 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:27:19.720603 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:27:19.720609 kernel: rcu: Hierarchical SRCU implementation. Feb 9 10:27:19.720615 kernel: Platform MSI: ITS@0x8080000 domain created Feb 9 10:27:19.720621 kernel: PCI/MSI: ITS@0x8080000 domain created Feb 9 10:27:19.720627 kernel: Remapping and enabling EFI services. Feb 9 10:27:19.720633 kernel: smp: Bringing up secondary CPUs ... Feb 9 10:27:19.720639 kernel: Detected PIPT I-cache on CPU1 Feb 9 10:27:19.720645 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Feb 9 10:27:19.720653 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Feb 9 10:27:19.720660 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:27:19.720666 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 10:27:19.720672 kernel: Detected PIPT I-cache on CPU2 Feb 9 10:27:19.720678 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Feb 9 10:27:19.720684 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Feb 9 10:27:19.720691 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:27:19.720697 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Feb 9 10:27:19.720718 kernel: Detected PIPT I-cache on CPU3 Feb 9 10:27:19.720725 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Feb 9 10:27:19.720732 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Feb 9 10:27:19.720739 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:27:19.720745 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Feb 9 10:27:19.720751 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 10:27:19.720761 kernel: SMP: Total of 4 processors activated. Feb 9 10:27:19.720769 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 10:27:19.720776 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 10:27:19.720782 kernel: CPU features: detected: Common not Private translations Feb 9 10:27:19.720789 kernel: CPU features: detected: CRC32 instructions Feb 9 10:27:19.720795 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 10:27:19.720802 kernel: CPU features: detected: LSE atomic instructions Feb 9 10:27:19.720808 kernel: CPU features: detected: Privileged Access Never Feb 9 10:27:19.720816 kernel: CPU features: detected: RAS Extension Support Feb 9 10:27:19.720822 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Feb 9 10:27:19.720829 kernel: CPU: All CPU(s) started at EL1 Feb 9 10:27:19.720835 kernel: alternatives: patching kernel code Feb 9 10:27:19.720843 kernel: devtmpfs: initialized Feb 9 10:27:19.720849 kernel: KASLR enabled Feb 9 10:27:19.720856 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 10:27:19.720862 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 10:27:19.720869 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 10:27:19.720875 kernel: SMBIOS 3.0.0 present. Feb 9 10:27:19.720882 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Feb 9 10:27:19.720888 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 10:27:19.720894 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 10:27:19.720901 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 10:27:19.720908 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 10:27:19.720915 kernel: audit: initializing netlink subsys (disabled) Feb 9 10:27:19.720921 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Feb 9 10:27:19.720928 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 10:27:19.720934 kernel: cpuidle: using governor menu Feb 9 10:27:19.720941 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 10:27:19.720947 kernel: ASID allocator initialised with 32768 entries Feb 9 10:27:19.720954 kernel: ACPI: bus type PCI registered Feb 9 10:27:19.720960 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 10:27:19.720967 kernel: Serial: AMBA PL011 UART driver Feb 9 10:27:19.720974 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 10:27:19.720983 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 10:27:19.720990 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 10:27:19.720996 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 10:27:19.721003 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 10:27:19.721009 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 10:27:19.721016 kernel: ACPI: Added _OSI(Module Device) Feb 9 10:27:19.721022 kernel: ACPI: Added _OSI(Processor Device) Feb 9 10:27:19.721030 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 10:27:19.721036 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 10:27:19.721043 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 10:27:19.721049 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 10:27:19.721056 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 10:27:19.721062 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 10:27:19.721068 kernel: ACPI: Interpreter enabled Feb 9 10:27:19.721075 kernel: ACPI: Using GIC for interrupt routing Feb 9 10:27:19.721081 kernel: ACPI: MCFG table detected, 1 entries Feb 9 10:27:19.721089 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Feb 9 10:27:19.721095 kernel: printk: console [ttyAMA0] enabled Feb 9 10:27:19.721102 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 10:27:19.721225 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 10:27:19.721288 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 9 10:27:19.721355 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 9 10:27:19.721413 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Feb 9 10:27:19.721474 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Feb 9 10:27:19.721483 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Feb 9 10:27:19.721489 kernel: PCI host bridge to bus 0000:00 Feb 9 10:27:19.721554 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Feb 9 10:27:19.721618 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 9 10:27:19.721672 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Feb 9 10:27:19.721723 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 10:27:19.721795 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Feb 9 10:27:19.721863 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 10:27:19.721923 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Feb 9 10:27:19.721982 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Feb 9 10:27:19.722041 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Feb 9 10:27:19.722100 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Feb 9 10:27:19.722158 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Feb 9 10:27:19.722225 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Feb 9 10:27:19.722285 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Feb 9 10:27:19.722348 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 9 10:27:19.722402 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Feb 9 10:27:19.722411 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 9 10:27:19.722418 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 9 10:27:19.722425 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 9 10:27:19.722433 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 9 10:27:19.722440 kernel: iommu: Default domain type: Translated Feb 9 10:27:19.722464 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 10:27:19.722471 kernel: vgaarb: loaded Feb 9 10:27:19.722477 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 10:27:19.722484 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 10:27:19.722490 kernel: PTP clock support registered Feb 9 10:27:19.722497 kernel: Registered efivars operations Feb 9 10:27:19.722503 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 10:27:19.722510 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 10:27:19.722518 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 10:27:19.722524 kernel: pnp: PnP ACPI init Feb 9 10:27:19.722599 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Feb 9 10:27:19.722609 kernel: pnp: PnP ACPI: found 1 devices Feb 9 10:27:19.722616 kernel: NET: Registered PF_INET protocol family Feb 9 10:27:19.722622 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:27:19.722629 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 10:27:19.722636 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 10:27:19.722644 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 10:27:19.722651 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 10:27:19.722658 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 10:27:19.722664 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:27:19.722671 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:27:19.722677 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 10:27:19.722683 kernel: PCI: CLS 0 bytes, default 64 Feb 9 10:27:19.722690 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Feb 9 10:27:19.722697 kernel: kvm [1]: HYP mode not available Feb 9 10:27:19.722704 kernel: Initialise system trusted keyrings Feb 9 10:27:19.722710 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 10:27:19.722717 kernel: Key type asymmetric registered Feb 9 10:27:19.722723 kernel: Asymmetric key parser 'x509' registered Feb 9 10:27:19.722730 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 10:27:19.722736 kernel: io scheduler mq-deadline registered Feb 9 10:27:19.722743 kernel: io scheduler kyber registered Feb 9 10:27:19.722749 kernel: io scheduler bfq registered Feb 9 10:27:19.722755 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 9 10:27:19.722763 kernel: ACPI: button: Power Button [PWRB] Feb 9 10:27:19.722770 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 9 10:27:19.722834 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Feb 9 10:27:19.722843 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 10:27:19.722850 kernel: thunder_xcv, ver 1.0 Feb 9 10:27:19.722856 kernel: thunder_bgx, ver 1.0 Feb 9 10:27:19.722863 kernel: nicpf, ver 1.0 Feb 9 10:27:19.722869 kernel: nicvf, ver 1.0 Feb 9 10:27:19.722938 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 10:27:19.722997 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T10:27:19 UTC (1707474439) Feb 9 10:27:19.723006 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 10:27:19.723013 kernel: NET: Registered PF_INET6 protocol family Feb 9 10:27:19.723020 kernel: Segment Routing with IPv6 Feb 9 10:27:19.723026 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 10:27:19.723032 kernel: NET: Registered PF_PACKET protocol family Feb 9 10:27:19.723039 kernel: Key type dns_resolver registered Feb 9 10:27:19.723045 kernel: registered taskstats version 1 Feb 9 10:27:19.723054 kernel: Loading compiled-in X.509 certificates Feb 9 10:27:19.723061 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 10:27:19.723068 kernel: Key type .fscrypt registered Feb 9 10:27:19.723079 kernel: Key type fscrypt-provisioning registered Feb 9 10:27:19.723086 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 10:27:19.723093 kernel: ima: Allocated hash algorithm: sha1 Feb 9 10:27:19.723099 kernel: ima: No architecture policies found Feb 9 10:27:19.723106 kernel: Freeing unused kernel memory: 34688K Feb 9 10:27:19.723112 kernel: Run /init as init process Feb 9 10:27:19.723120 kernel: with arguments: Feb 9 10:27:19.723126 kernel: /init Feb 9 10:27:19.723133 kernel: with environment: Feb 9 10:27:19.723139 kernel: HOME=/ Feb 9 10:27:19.723145 kernel: TERM=linux Feb 9 10:27:19.723151 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 10:27:19.723160 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:27:19.723168 systemd[1]: Detected virtualization kvm. Feb 9 10:27:19.723177 systemd[1]: Detected architecture arm64. Feb 9 10:27:19.723183 systemd[1]: Running in initrd. Feb 9 10:27:19.723190 systemd[1]: No hostname configured, using default hostname. Feb 9 10:27:19.723197 systemd[1]: Hostname set to . Feb 9 10:27:19.723204 systemd[1]: Initializing machine ID from VM UUID. Feb 9 10:27:19.723211 systemd[1]: Queued start job for default target initrd.target. Feb 9 10:27:19.723221 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:27:19.723228 systemd[1]: Reached target cryptsetup.target. Feb 9 10:27:19.723236 systemd[1]: Reached target paths.target. Feb 9 10:27:19.723243 systemd[1]: Reached target slices.target. Feb 9 10:27:19.723250 systemd[1]: Reached target swap.target. Feb 9 10:27:19.723257 systemd[1]: Reached target timers.target. Feb 9 10:27:19.723264 systemd[1]: Listening on iscsid.socket. Feb 9 10:27:19.723271 systemd[1]: Listening on iscsiuio.socket. Feb 9 10:27:19.723278 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 10:27:19.723286 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 10:27:19.723293 systemd[1]: Listening on systemd-journald.socket. Feb 9 10:27:19.723300 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:27:19.723307 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:27:19.723342 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:27:19.723349 systemd[1]: Reached target sockets.target. Feb 9 10:27:19.723356 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:27:19.723363 systemd[1]: Finished network-cleanup.service. Feb 9 10:27:19.723370 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 10:27:19.723379 systemd[1]: Starting systemd-journald.service... Feb 9 10:27:19.723386 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:27:19.723393 systemd[1]: Starting systemd-resolved.service... Feb 9 10:27:19.723400 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 10:27:19.723407 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:27:19.723413 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 10:27:19.723420 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:27:19.723427 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 10:27:19.723435 kernel: audit: type=1130 audit(1707474439.720:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.723443 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 10:27:19.723453 systemd-journald[290]: Journal started Feb 9 10:27:19.723491 systemd-journald[290]: Runtime Journal (/run/log/journal/b93cce9a4183450685e23f8af30d6a25) is 6.0M, max 48.7M, 42.6M free. Feb 9 10:27:19.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.714367 systemd-modules-load[291]: Inserted module 'overlay' Feb 9 10:27:19.725386 systemd[1]: Started systemd-journald.service. Feb 9 10:27:19.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.729903 kernel: audit: type=1130 audit(1707474439.725:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.729933 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 10:27:19.735916 kernel: Bridge firewalling registered Feb 9 10:27:19.732205 systemd-modules-load[291]: Inserted module 'br_netfilter' Feb 9 10:27:19.735441 systemd-resolved[292]: Positive Trust Anchors: Feb 9 10:27:19.735448 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:27:19.735475 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:27:19.740325 systemd-resolved[292]: Defaulting to hostname 'linux'. Feb 9 10:27:19.746791 kernel: SCSI subsystem initialized Feb 9 10:27:19.746807 kernel: audit: type=1130 audit(1707474439.743:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.741056 systemd[1]: Started systemd-resolved.service. Feb 9 10:27:19.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.744914 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:27:19.752264 kernel: audit: type=1130 audit(1707474439.747:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.752283 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 10:27:19.752292 kernel: device-mapper: uevent: version 1.0.3 Feb 9 10:27:19.752300 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 10:27:19.747580 systemd[1]: Reached target nss-lookup.target. Feb 9 10:27:19.752411 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 10:27:19.756362 kernel: audit: type=1130 audit(1707474439.753:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.756455 systemd[1]: Starting dracut-cmdline.service... Feb 9 10:27:19.757627 systemd-modules-load[291]: Inserted module 'dm_multipath' Feb 9 10:27:19.758268 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:27:19.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.759620 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:27:19.762773 kernel: audit: type=1130 audit(1707474439.758:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.766111 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:27:19.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.768302 dracut-cmdline[307]: dracut-dracut-053 Feb 9 10:27:19.769495 kernel: audit: type=1130 audit(1707474439.766:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.770470 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:27:19.823331 kernel: Loading iSCSI transport class v2.0-870. Feb 9 10:27:19.833336 kernel: iscsi: registered transport (tcp) Feb 9 10:27:19.846337 kernel: iscsi: registered transport (qla4xxx) Feb 9 10:27:19.846359 kernel: QLogic iSCSI HBA Driver Feb 9 10:27:19.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.879371 systemd[1]: Finished dracut-cmdline.service. Feb 9 10:27:19.880729 systemd[1]: Starting dracut-pre-udev.service... Feb 9 10:27:19.883030 kernel: audit: type=1130 audit(1707474439.879:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:19.924346 kernel: raid6: neonx8 gen() 13737 MB/s Feb 9 10:27:19.941328 kernel: raid6: neonx8 xor() 10775 MB/s Feb 9 10:27:19.958328 kernel: raid6: neonx4 gen() 13532 MB/s Feb 9 10:27:19.975335 kernel: raid6: neonx4 xor() 11218 MB/s Feb 9 10:27:19.992337 kernel: raid6: neonx2 gen() 12896 MB/s Feb 9 10:27:20.009336 kernel: raid6: neonx2 xor() 10253 MB/s Feb 9 10:27:20.026335 kernel: raid6: neonx1 gen() 10494 MB/s Feb 9 10:27:20.043335 kernel: raid6: neonx1 xor() 8770 MB/s Feb 9 10:27:20.060334 kernel: raid6: int64x8 gen() 5572 MB/s Feb 9 10:27:20.077334 kernel: raid6: int64x8 xor() 3544 MB/s Feb 9 10:27:20.094335 kernel: raid6: int64x4 gen() 7224 MB/s Feb 9 10:27:20.111334 kernel: raid6: int64x4 xor() 3843 MB/s Feb 9 10:27:20.128346 kernel: raid6: int64x2 gen() 6133 MB/s Feb 9 10:27:20.145340 kernel: raid6: int64x2 xor() 3314 MB/s Feb 9 10:27:20.162335 kernel: raid6: int64x1 gen() 5037 MB/s Feb 9 10:27:20.179508 kernel: raid6: int64x1 xor() 2639 MB/s Feb 9 10:27:20.179534 kernel: raid6: using algorithm neonx8 gen() 13737 MB/s Feb 9 10:27:20.179551 kernel: raid6: .... xor() 10775 MB/s, rmw enabled Feb 9 10:27:20.179567 kernel: raid6: using neon recovery algorithm Feb 9 10:27:20.190326 kernel: xor: measuring software checksum speed Feb 9 10:27:20.190345 kernel: 8regs : 17289 MB/sec Feb 9 10:27:20.191330 kernel: 32regs : 20749 MB/sec Feb 9 10:27:20.192327 kernel: arm64_neon : 27629 MB/sec Feb 9 10:27:20.192337 kernel: xor: using function: arm64_neon (27629 MB/sec) Feb 9 10:27:20.243354 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 10:27:20.253563 systemd[1]: Finished dracut-pre-udev.service. Feb 9 10:27:20.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:20.256000 audit: BPF prog-id=7 op=LOAD Feb 9 10:27:20.256000 audit: BPF prog-id=8 op=LOAD Feb 9 10:27:20.256914 systemd[1]: Starting systemd-udevd.service... Feb 9 10:27:20.258039 kernel: audit: type=1130 audit(1707474440.253:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:20.272040 systemd-udevd[492]: Using default interface naming scheme 'v252'. Feb 9 10:27:20.275330 systemd[1]: Started systemd-udevd.service. Feb 9 10:27:20.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:20.277144 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 10:27:20.288434 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation Feb 9 10:27:20.313998 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 10:27:20.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:20.315269 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:27:20.347965 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:27:20.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:20.373927 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 10:27:20.376328 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 10:27:20.376357 kernel: GPT:9289727 != 19775487 Feb 9 10:27:20.376367 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 10:27:20.376375 kernel: GPT:9289727 != 19775487 Feb 9 10:27:20.376383 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 10:27:20.376391 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:27:20.390253 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 10:27:20.392655 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (544) Feb 9 10:27:20.391460 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 10:27:20.396023 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 10:27:20.401659 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 10:27:20.410426 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:27:20.412008 systemd[1]: Starting disk-uuid.service... Feb 9 10:27:20.417645 disk-uuid[561]: Primary Header is updated. Feb 9 10:27:20.417645 disk-uuid[561]: Secondary Entries is updated. Feb 9 10:27:20.417645 disk-uuid[561]: Secondary Header is updated. Feb 9 10:27:20.420326 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:27:21.432127 disk-uuid[562]: The operation has completed successfully. Feb 9 10:27:21.433453 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:27:21.455738 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 10:27:21.456791 systemd[1]: Finished disk-uuid.service. Feb 9 10:27:21.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.461566 systemd[1]: Starting verity-setup.service... Feb 9 10:27:21.481333 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 10:27:21.501536 systemd[1]: Found device dev-mapper-usr.device. Feb 9 10:27:21.503415 systemd[1]: Mounting sysusr-usr.mount... Feb 9 10:27:21.505094 systemd[1]: Finished verity-setup.service. Feb 9 10:27:21.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.550334 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 10:27:21.550726 systemd[1]: Mounted sysusr-usr.mount. Feb 9 10:27:21.551470 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 10:27:21.552108 systemd[1]: Starting ignition-setup.service... Feb 9 10:27:21.553882 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 10:27:21.560546 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:27:21.560573 kernel: BTRFS info (device vda6): using free space tree Feb 9 10:27:21.560592 kernel: BTRFS info (device vda6): has skinny extents Feb 9 10:27:21.567969 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 10:27:21.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.573359 systemd[1]: Finished ignition-setup.service. Feb 9 10:27:21.574793 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 10:27:21.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.647354 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 10:27:21.648000 audit: BPF prog-id=9 op=LOAD Feb 9 10:27:21.649210 ignition[646]: Ignition 2.14.0 Feb 9 10:27:21.649221 ignition[646]: Stage: fetch-offline Feb 9 10:27:21.649462 systemd[1]: Starting systemd-networkd.service... Feb 9 10:27:21.649258 ignition[646]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:27:21.649267 ignition[646]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:27:21.649403 ignition[646]: parsed url from cmdline: "" Feb 9 10:27:21.649406 ignition[646]: no config URL provided Feb 9 10:27:21.649411 ignition[646]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:27:21.649418 ignition[646]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:27:21.649437 ignition[646]: op(1): [started] loading QEMU firmware config module Feb 9 10:27:21.649441 ignition[646]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 10:27:21.656278 ignition[646]: op(1): [finished] loading QEMU firmware config module Feb 9 10:27:21.672132 systemd-networkd[739]: lo: Link UP Feb 9 10:27:21.672146 systemd-networkd[739]: lo: Gained carrier Feb 9 10:27:21.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.672531 systemd-networkd[739]: Enumeration completed Feb 9 10:27:21.672609 systemd[1]: Started systemd-networkd.service. Feb 9 10:27:21.672717 systemd-networkd[739]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:27:21.673787 systemd-networkd[739]: eth0: Link UP Feb 9 10:27:21.673791 systemd-networkd[739]: eth0: Gained carrier Feb 9 10:27:21.673956 systemd[1]: Reached target network.target. Feb 9 10:27:21.675466 systemd[1]: Starting iscsiuio.service... Feb 9 10:27:21.682101 ignition[646]: parsing config with SHA512: e052a1a191cc2f2a884c10aa1909bdbd5ed00faa2e162d50487b989bb65a036bd5a4f23fee463ce2ae4b0f0d77b7dd6e6674d661ce03d7f028eea532deef5adf Feb 9 10:27:21.684795 systemd[1]: Started iscsiuio.service. Feb 9 10:27:21.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.685588 systemd-networkd[739]: eth0: DHCPv4 address 10.0.0.4/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 10:27:21.687528 systemd[1]: Starting iscsid.service... Feb 9 10:27:21.690613 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:27:21.690613 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 10:27:21.690613 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 10:27:21.690613 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 10:27:21.690613 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:27:21.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.693495 systemd[1]: Started iscsid.service. Feb 9 10:27:21.704056 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 10:27:21.697692 systemd[1]: Starting dracut-initqueue.service... Feb 9 10:27:21.707671 systemd[1]: Finished dracut-initqueue.service. Feb 9 10:27:21.708335 systemd[1]: Reached target remote-fs-pre.target. Feb 9 10:27:21.709378 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:27:21.710533 systemd[1]: Reached target remote-fs.target. Feb 9 10:27:21.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.712186 systemd[1]: Starting dracut-pre-mount.service... Feb 9 10:27:21.713828 unknown[646]: fetched base config from "system" Feb 9 10:27:21.713839 unknown[646]: fetched user config from "qemu" Feb 9 10:27:21.714259 ignition[646]: fetch-offline: fetch-offline passed Feb 9 10:27:21.714331 ignition[646]: Ignition finished successfully Feb 9 10:27:21.716193 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 10:27:21.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.717471 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 10:27:21.718140 systemd[1]: Starting ignition-kargs.service... Feb 9 10:27:21.719601 systemd[1]: Finished dracut-pre-mount.service. Feb 9 10:27:21.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.726842 ignition[760]: Ignition 2.14.0 Feb 9 10:27:21.726852 ignition[760]: Stage: kargs Feb 9 10:27:21.726940 ignition[760]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:27:21.726950 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:27:21.727804 ignition[760]: kargs: kargs passed Feb 9 10:27:21.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.729805 systemd[1]: Finished ignition-kargs.service. Feb 9 10:27:21.727847 ignition[760]: Ignition finished successfully Feb 9 10:27:21.731784 systemd[1]: Starting ignition-disks.service... Feb 9 10:27:21.737870 ignition[768]: Ignition 2.14.0 Feb 9 10:27:21.737879 ignition[768]: Stage: disks Feb 9 10:27:21.737971 ignition[768]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:27:21.739739 systemd[1]: Finished ignition-disks.service. Feb 9 10:27:21.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.737981 ignition[768]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:27:21.741205 systemd[1]: Reached target initrd-root-device.target. Feb 9 10:27:21.738843 ignition[768]: disks: disks passed Feb 9 10:27:21.742270 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:27:21.738886 ignition[768]: Ignition finished successfully Feb 9 10:27:21.743510 systemd[1]: Reached target local-fs.target. Feb 9 10:27:21.744635 systemd[1]: Reached target sysinit.target. Feb 9 10:27:21.745639 systemd[1]: Reached target basic.target. Feb 9 10:27:21.747405 systemd[1]: Starting systemd-fsck-root.service... Feb 9 10:27:21.757606 systemd-fsck[776]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 9 10:27:21.760889 systemd[1]: Finished systemd-fsck-root.service. Feb 9 10:27:21.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.764358 systemd[1]: Mounting sysroot.mount... Feb 9 10:27:21.770326 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 10:27:21.770611 systemd[1]: Mounted sysroot.mount. Feb 9 10:27:21.771265 systemd[1]: Reached target initrd-root-fs.target. Feb 9 10:27:21.773115 systemd[1]: Mounting sysroot-usr.mount... Feb 9 10:27:21.774096 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 10:27:21.774135 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 10:27:21.774156 systemd[1]: Reached target ignition-diskful.target. Feb 9 10:27:21.775731 systemd[1]: Mounted sysroot-usr.mount. Feb 9 10:27:21.777259 systemd[1]: Starting initrd-setup-root.service... Feb 9 10:27:21.781433 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 10:27:21.786124 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Feb 9 10:27:21.790018 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 10:27:21.793691 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 10:27:21.819896 systemd[1]: Finished initrd-setup-root.service. Feb 9 10:27:21.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.821269 systemd[1]: Starting ignition-mount.service... Feb 9 10:27:21.822471 systemd[1]: Starting sysroot-boot.service... Feb 9 10:27:21.826615 bash[827]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 10:27:21.834896 ignition[829]: INFO : Ignition 2.14.0 Feb 9 10:27:21.834896 ignition[829]: INFO : Stage: mount Feb 9 10:27:21.836192 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:27:21.836192 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:27:21.836192 ignition[829]: INFO : mount: mount passed Feb 9 10:27:21.836192 ignition[829]: INFO : Ignition finished successfully Feb 9 10:27:21.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:21.837016 systemd[1]: Finished ignition-mount.service. Feb 9 10:27:21.840433 systemd[1]: Finished sysroot-boot.service. Feb 9 10:27:21.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:22.512228 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:27:22.518569 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (838) Feb 9 10:27:22.518604 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:27:22.518614 kernel: BTRFS info (device vda6): using free space tree Feb 9 10:27:22.519453 kernel: BTRFS info (device vda6): has skinny extents Feb 9 10:27:22.522287 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:27:22.523707 systemd[1]: Starting ignition-files.service... Feb 9 10:27:22.537222 ignition[858]: INFO : Ignition 2.14.0 Feb 9 10:27:22.537222 ignition[858]: INFO : Stage: files Feb 9 10:27:22.538603 ignition[858]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:27:22.538603 ignition[858]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:27:22.538603 ignition[858]: DEBUG : files: compiled without relabeling support, skipping Feb 9 10:27:22.548085 ignition[858]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 10:27:22.548085 ignition[858]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 10:27:22.551799 ignition[858]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 10:27:22.552971 ignition[858]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 10:27:22.552971 ignition[858]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 10:27:22.552543 unknown[858]: wrote ssh authorized keys file for user: core Feb 9 10:27:22.556251 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:27:22.556251 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 10:27:22.828071 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 10:27:23.017253 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 10:27:23.019512 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:27:23.019512 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:27:23.019512 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 10:27:23.195821 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 10:27:23.313341 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 10:27:23.315725 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:27:23.315725 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:27:23.315725 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 10:27:23.369883 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 10:27:23.401517 systemd-networkd[739]: eth0: Gained IPv6LL Feb 9 10:27:23.766360 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 10:27:23.768584 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:27:23.768584 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:27:23.768584 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 10:27:23.789033 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 10:27:24.821053 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 10:27:24.823709 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:27:24.823709 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 10:27:24.823709 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 10:27:24.823709 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:27:24.823709 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:27:24.823709 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:27:24.823709 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(a): [started] processing unit "coreos-metadata.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(a): op(b): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(a): op(b): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(a): [finished] processing unit "coreos-metadata.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(c): [started] processing unit "prepare-cni-plugins.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(c): op(d): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(c): op(d): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(c): [finished] processing unit "prepare-cni-plugins.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(e): [started] processing unit "prepare-critools.service" Feb 9 10:27:24.823709 ignition[858]: INFO : files: op(e): op(f): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:27:24.846282 ignition[858]: INFO : files: op(e): op(f): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:27:24.846282 ignition[858]: INFO : files: op(e): [finished] processing unit "prepare-critools.service" Feb 9 10:27:24.846282 ignition[858]: INFO : files: op(10): [started] setting preset to enabled for "prepare-critools.service" Feb 9 10:27:24.846282 ignition[858]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 10:27:24.846282 ignition[858]: INFO : files: op(11): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 10:27:24.846282 ignition[858]: INFO : files: op(11): op(12): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 10:27:24.855874 ignition[858]: INFO : files: op(11): op(12): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 10:27:24.858018 ignition[858]: INFO : files: op(11): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 10:27:24.858018 ignition[858]: INFO : files: op(13): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:27:24.858018 ignition[858]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:27:24.858018 ignition[858]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:27:24.858018 ignition[858]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:27:24.858018 ignition[858]: INFO : files: files passed Feb 9 10:27:24.858018 ignition[858]: INFO : Ignition finished successfully Feb 9 10:27:24.872024 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 10:27:24.872045 kernel: audit: type=1130 audit(1707474444.859:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.872056 kernel: audit: type=1130 audit(1707474444.868:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.858132 systemd[1]: Finished ignition-files.service. Feb 9 10:27:24.860710 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 10:27:24.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.864064 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 10:27:24.879165 kernel: audit: type=1130 audit(1707474444.873:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.879183 kernel: audit: type=1131 audit(1707474444.873:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.879192 initrd-setup-root-after-ignition[881]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 10:27:24.864760 systemd[1]: Starting ignition-quench.service... Feb 9 10:27:24.880907 initrd-setup-root-after-ignition[884]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 10:27:24.867575 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 10:27:24.868679 systemd[1]: Reached target ignition-complete.target. Feb 9 10:27:24.872169 systemd[1]: Starting initrd-parse-etc.service... Feb 9 10:27:24.872918 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 10:27:24.888605 kernel: audit: type=1130 audit(1707474444.884:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.888622 kernel: audit: type=1131 audit(1707474444.884:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.873003 systemd[1]: Finished ignition-quench.service. Feb 9 10:27:24.883868 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 10:27:24.883952 systemd[1]: Finished initrd-parse-etc.service. Feb 9 10:27:24.884798 systemd[1]: Reached target initrd-fs.target. Feb 9 10:27:24.889287 systemd[1]: Reached target initrd.target. Feb 9 10:27:24.890457 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 10:27:24.891181 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 10:27:24.901221 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 10:27:24.904699 kernel: audit: type=1130 audit(1707474444.901:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.902776 systemd[1]: Starting initrd-cleanup.service... Feb 9 10:27:24.910644 systemd[1]: Stopped target nss-lookup.target. Feb 9 10:27:24.911301 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 10:27:24.912444 systemd[1]: Stopped target timers.target. Feb 9 10:27:24.913558 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 10:27:24.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.913684 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 10:27:24.917822 kernel: audit: type=1131 audit(1707474444.914:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.914711 systemd[1]: Stopped target initrd.target. Feb 9 10:27:24.917488 systemd[1]: Stopped target basic.target. Feb 9 10:27:24.918500 systemd[1]: Stopped target ignition-complete.target. Feb 9 10:27:24.919548 systemd[1]: Stopped target ignition-diskful.target. Feb 9 10:27:24.920588 systemd[1]: Stopped target initrd-root-device.target. Feb 9 10:27:24.921777 systemd[1]: Stopped target remote-fs.target. Feb 9 10:27:24.922784 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 10:27:24.923889 systemd[1]: Stopped target sysinit.target. Feb 9 10:27:24.924854 systemd[1]: Stopped target local-fs.target. Feb 9 10:27:24.925835 systemd[1]: Stopped target local-fs-pre.target. Feb 9 10:27:24.926831 systemd[1]: Stopped target swap.target. Feb 9 10:27:24.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.927744 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 10:27:24.931933 kernel: audit: type=1131 audit(1707474444.928:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.927862 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 10:27:24.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.928895 systemd[1]: Stopped target cryptsetup.target. Feb 9 10:27:24.935711 kernel: audit: type=1131 audit(1707474444.932:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.931448 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 10:27:24.931561 systemd[1]: Stopped dracut-initqueue.service. Feb 9 10:27:24.932687 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 10:27:24.932792 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 10:27:24.935437 systemd[1]: Stopped target paths.target. Feb 9 10:27:24.936214 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 10:27:24.940351 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 10:27:24.941199 systemd[1]: Stopped target slices.target. Feb 9 10:27:24.942264 systemd[1]: Stopped target sockets.target. Feb 9 10:27:24.943253 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 10:27:24.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.943395 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 10:27:24.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.944472 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 10:27:24.944583 systemd[1]: Stopped ignition-files.service. Feb 9 10:27:24.947907 iscsid[746]: iscsid shutting down. Feb 9 10:27:24.946580 systemd[1]: Stopping ignition-mount.service... Feb 9 10:27:24.947629 systemd[1]: Stopping iscsid.service... Feb 9 10:27:24.948342 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 10:27:24.948460 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 10:27:24.954057 ignition[898]: INFO : Ignition 2.14.0 Feb 9 10:27:24.954057 ignition[898]: INFO : Stage: umount Feb 9 10:27:24.954057 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:27:24.954057 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:27:24.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.950433 systemd[1]: Stopping sysroot-boot.service... Feb 9 10:27:24.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.957952 ignition[898]: INFO : umount: umount passed Feb 9 10:27:24.957952 ignition[898]: INFO : Ignition finished successfully Feb 9 10:27:24.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.951054 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 10:27:24.951243 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 10:27:24.952603 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 10:27:24.952749 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 10:27:24.955999 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 10:27:24.956103 systemd[1]: Stopped iscsid.service. Feb 9 10:27:24.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.957937 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 10:27:24.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.958021 systemd[1]: Stopped ignition-mount.service. Feb 9 10:27:24.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.960216 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 10:27:24.962070 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 10:27:24.962106 systemd[1]: Closed iscsid.socket. Feb 9 10:27:24.963101 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 10:27:24.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.963143 systemd[1]: Stopped ignition-disks.service. Feb 9 10:27:24.964132 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 10:27:24.964171 systemd[1]: Stopped ignition-kargs.service. Feb 9 10:27:24.965134 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 10:27:24.965172 systemd[1]: Stopped ignition-setup.service. Feb 9 10:27:24.966359 systemd[1]: Stopping iscsiuio.service... Feb 9 10:27:24.967958 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 10:27:24.968046 systemd[1]: Finished initrd-cleanup.service. Feb 9 10:27:24.969128 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 10:27:24.969210 systemd[1]: Stopped iscsiuio.service. Feb 9 10:27:24.970029 systemd[1]: Stopped target network.target. Feb 9 10:27:24.971068 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 10:27:24.971104 systemd[1]: Closed iscsiuio.socket. Feb 9 10:27:24.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.972276 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:27:24.973646 systemd[1]: Stopping systemd-resolved.service... Feb 9 10:27:24.977362 systemd-networkd[739]: eth0: DHCPv6 lease lost Feb 9 10:27:24.979633 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:27:24.984000 audit: BPF prog-id=9 op=UNLOAD Feb 9 10:27:24.979868 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:27:24.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.981296 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 10:27:24.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.981340 systemd[1]: Closed systemd-networkd.socket. Feb 9 10:27:24.982853 systemd[1]: Stopping network-cleanup.service... Feb 9 10:27:24.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.983829 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 10:27:24.983890 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 10:27:24.985837 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 10:27:24.985882 systemd[1]: Stopped systemd-sysctl.service. Feb 9 10:27:24.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.987498 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 10:27:24.987538 systemd[1]: Stopped systemd-modules-load.service. Feb 9 10:27:24.988862 systemd[1]: Stopping systemd-udevd.service... Feb 9 10:27:24.993208 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 10:27:24.999000 audit: BPF prog-id=6 op=UNLOAD Feb 9 10:27:24.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.994442 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 10:27:24.994538 systemd[1]: Stopped systemd-resolved.service. Feb 9 10:27:25.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:24.998439 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 10:27:24.998575 systemd[1]: Stopped network-cleanup.service. Feb 9 10:27:25.001560 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 10:27:25.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.001689 systemd[1]: Stopped systemd-udevd.service. Feb 9 10:27:25.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.003812 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 10:27:25.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.003854 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 10:27:25.005500 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 10:27:25.005534 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 10:27:25.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.006850 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 10:27:25.006899 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 10:27:25.007977 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 10:27:25.008016 systemd[1]: Stopped dracut-cmdline.service. Feb 9 10:27:25.009117 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 10:27:25.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.009155 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 10:27:25.010910 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 10:27:25.012145 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 10:27:25.012209 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 10:27:25.016661 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 10:27:25.016751 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 10:27:25.027487 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 10:27:25.027592 systemd[1]: Stopped sysroot-boot.service. Feb 9 10:27:25.028980 systemd[1]: Reached target initrd-switch-root.target. Feb 9 10:27:25.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.029909 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 10:27:25.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.029959 systemd[1]: Stopped initrd-setup-root.service. Feb 9 10:27:25.031751 systemd[1]: Starting initrd-switch-root.service... Feb 9 10:27:25.038090 systemd[1]: Switching root. Feb 9 10:27:25.053643 systemd-journald[290]: Journal stopped Feb 9 10:27:27.077375 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Feb 9 10:27:27.077441 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 10:27:27.077454 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 10:27:27.077464 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 10:27:27.077474 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 10:27:27.077486 kernel: SELinux: policy capability open_perms=1 Feb 9 10:27:27.077496 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 10:27:27.077505 kernel: SELinux: policy capability always_check_network=0 Feb 9 10:27:27.077515 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 10:27:27.077525 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 10:27:27.077535 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 10:27:27.077544 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 10:27:27.077559 systemd[1]: Successfully loaded SELinux policy in 30.517ms. Feb 9 10:27:27.077579 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.888ms. Feb 9 10:27:27.077592 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:27:27.077603 systemd[1]: Detected virtualization kvm. Feb 9 10:27:27.077617 systemd[1]: Detected architecture arm64. Feb 9 10:27:27.077627 systemd[1]: Detected first boot. Feb 9 10:27:27.077637 systemd[1]: Initializing machine ID from VM UUID. Feb 9 10:27:27.077647 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 10:27:27.077657 systemd[1]: Populated /etc with preset unit settings. Feb 9 10:27:27.077668 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:27:27.077681 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:27:27.077700 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:27:27.077712 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 10:27:27.077723 systemd[1]: Stopped initrd-switch-root.service. Feb 9 10:27:27.077733 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 10:27:27.077744 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 10:27:27.077755 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 10:27:27.077770 systemd[1]: Created slice system-getty.slice. Feb 9 10:27:27.077780 systemd[1]: Created slice system-modprobe.slice. Feb 9 10:27:27.077791 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 10:27:27.077801 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 10:27:27.077812 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 10:27:27.077822 systemd[1]: Created slice user.slice. Feb 9 10:27:27.077833 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:27:27.077843 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 10:27:27.077855 systemd[1]: Set up automount boot.automount. Feb 9 10:27:27.077866 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 10:27:27.077876 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 10:27:27.077887 systemd[1]: Stopped target initrd-fs.target. Feb 9 10:27:27.077897 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 10:27:27.077908 systemd[1]: Reached target integritysetup.target. Feb 9 10:27:27.077918 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:27:27.077929 systemd[1]: Reached target remote-fs.target. Feb 9 10:27:27.077941 systemd[1]: Reached target slices.target. Feb 9 10:27:27.077951 systemd[1]: Reached target swap.target. Feb 9 10:27:27.077962 systemd[1]: Reached target torcx.target. Feb 9 10:27:27.077972 systemd[1]: Reached target veritysetup.target. Feb 9 10:27:27.077982 systemd[1]: Listening on systemd-coredump.socket. Feb 9 10:27:27.077993 systemd[1]: Listening on systemd-initctl.socket. Feb 9 10:27:27.078003 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:27:27.078014 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:27:27.078024 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:27:27.078035 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 10:27:27.078047 systemd[1]: Mounting dev-hugepages.mount... Feb 9 10:27:27.078057 systemd[1]: Mounting dev-mqueue.mount... Feb 9 10:27:27.078068 systemd[1]: Mounting media.mount... Feb 9 10:27:27.078079 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 10:27:27.078090 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 10:27:27.078100 systemd[1]: Mounting tmp.mount... Feb 9 10:27:27.078110 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 10:27:27.078121 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 10:27:27.078131 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:27:27.078143 systemd[1]: Starting modprobe@configfs.service... Feb 9 10:27:27.078154 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 10:27:27.078164 systemd[1]: Starting modprobe@drm.service... Feb 9 10:27:27.078174 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 10:27:27.078184 systemd[1]: Starting modprobe@fuse.service... Feb 9 10:27:27.078195 systemd[1]: Starting modprobe@loop.service... Feb 9 10:27:27.078206 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 10:27:27.078217 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 10:27:27.078228 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 10:27:27.078239 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 10:27:27.078250 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 10:27:27.078261 systemd[1]: Stopped systemd-journald.service. Feb 9 10:27:27.078271 kernel: fuse: init (API version 7.34) Feb 9 10:27:27.078281 kernel: loop: module loaded Feb 9 10:27:27.078293 systemd[1]: Starting systemd-journald.service... Feb 9 10:27:27.078307 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:27:27.078342 systemd[1]: Starting systemd-network-generator.service... Feb 9 10:27:27.078353 systemd[1]: Starting systemd-remount-fs.service... Feb 9 10:27:27.078364 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:27:27.078374 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 10:27:27.078387 systemd[1]: Stopped verity-setup.service. Feb 9 10:27:27.078397 systemd[1]: Mounted dev-hugepages.mount. Feb 9 10:27:27.078408 systemd[1]: Mounted dev-mqueue.mount. Feb 9 10:27:27.078418 systemd[1]: Mounted media.mount. Feb 9 10:27:27.078428 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 10:27:27.078438 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 10:27:27.078450 systemd[1]: Mounted tmp.mount. Feb 9 10:27:27.078461 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:27:27.078472 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 10:27:27.078483 systemd[1]: Finished modprobe@configfs.service. Feb 9 10:27:27.078494 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 10:27:27.078504 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 10:27:27.078516 systemd-journald[995]: Journal started Feb 9 10:27:27.078563 systemd-journald[995]: Runtime Journal (/run/log/journal/b93cce9a4183450685e23f8af30d6a25) is 6.0M, max 48.7M, 42.6M free. Feb 9 10:27:25.115000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 10:27:25.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:27:25.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:27:25.264000 audit: BPF prog-id=10 op=LOAD Feb 9 10:27:25.264000 audit: BPF prog-id=10 op=UNLOAD Feb 9 10:27:25.264000 audit: BPF prog-id=11 op=LOAD Feb 9 10:27:25.264000 audit: BPF prog-id=11 op=UNLOAD Feb 9 10:27:25.296000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:27:25.296000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001038e2 a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:25.296000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:27:25.297000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:27:25.297000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001039b9 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:25.297000 audit: CWD cwd="/" Feb 9 10:27:25.297000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:25.297000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:25.297000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:27:26.957000 audit: BPF prog-id=12 op=LOAD Feb 9 10:27:26.957000 audit: BPF prog-id=3 op=UNLOAD Feb 9 10:27:26.957000 audit: BPF prog-id=13 op=LOAD Feb 9 10:27:26.957000 audit: BPF prog-id=14 op=LOAD Feb 9 10:27:26.957000 audit: BPF prog-id=4 op=UNLOAD Feb 9 10:27:26.957000 audit: BPF prog-id=5 op=UNLOAD Feb 9 10:27:26.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:26.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:26.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:26.968000 audit: BPF prog-id=12 op=UNLOAD Feb 9 10:27:27.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.043000 audit: BPF prog-id=15 op=LOAD Feb 9 10:27:27.043000 audit: BPF prog-id=16 op=LOAD Feb 9 10:27:27.043000 audit: BPF prog-id=17 op=LOAD Feb 9 10:27:27.043000 audit: BPF prog-id=13 op=UNLOAD Feb 9 10:27:27.043000 audit: BPF prog-id=14 op=UNLOAD Feb 9 10:27:27.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.071000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:27:27.071000 audit[995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffcfb9cf70 a2=4000 a3=1 items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.071000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 10:27:27.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.295209 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:27:26.955976 systemd[1]: Queued start job for default target multi-user.target. Feb 9 10:27:25.295706 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:27:26.955988 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 10:27:27.079846 systemd[1]: Started systemd-journald.service. Feb 9 10:27:25.295725 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:27:26.958508 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 10:27:27.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:25.295755 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 10:27:25.295765 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 10:27:25.295792 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 10:27:27.080187 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 10:27:25.295804 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 10:27:25.295986 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 10:27:27.080364 systemd[1]: Finished modprobe@drm.service. Feb 9 10:27:25.296019 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:27:25.296030 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:27:25.296399 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 10:27:25.296430 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 10:27:25.296448 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 10:27:25.296462 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 10:27:25.296478 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 10:27:25.296492 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 10:27:27.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:26.712899 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:27:26.713158 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:27:26.713253 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:27:26.713432 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:27:26.713484 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 10:27:26.713542 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:27:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 10:27:27.081685 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 10:27:27.081852 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 10:27:27.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.082972 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 10:27:27.083122 systemd[1]: Finished modprobe@fuse.service. Feb 9 10:27:27.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.084015 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 10:27:27.084149 systemd[1]: Finished modprobe@loop.service. Feb 9 10:27:27.085167 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:27:27.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.086209 systemd[1]: Finished systemd-network-generator.service. Feb 9 10:27:27.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.087220 systemd[1]: Finished systemd-remount-fs.service. Feb 9 10:27:27.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.088450 systemd[1]: Reached target network-pre.target. Feb 9 10:27:27.090216 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 10:27:27.091900 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 10:27:27.092574 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 10:27:27.094117 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 10:27:27.095875 systemd[1]: Starting systemd-journal-flush.service... Feb 9 10:27:27.096596 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 10:27:27.097532 systemd[1]: Starting systemd-random-seed.service... Feb 9 10:27:27.098205 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 10:27:27.099458 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:27:27.103335 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 10:27:27.104214 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 10:27:27.105119 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 10:27:27.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.107225 systemd[1]: Starting systemd-sysusers.service... Feb 9 10:27:27.109746 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:27:27.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.110877 systemd[1]: Finished systemd-random-seed.service. Feb 9 10:27:27.111601 systemd-journald[995]: Time spent on flushing to /var/log/journal/b93cce9a4183450685e23f8af30d6a25 is 12.170ms for 1002 entries. Feb 9 10:27:27.111601 systemd-journald[995]: System Journal (/var/log/journal/b93cce9a4183450685e23f8af30d6a25) is 8.0M, max 195.6M, 187.6M free. Feb 9 10:27:27.135761 systemd-journald[995]: Received client request to flush runtime journal. Feb 9 10:27:27.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.111733 systemd[1]: Reached target first-boot-complete.target. Feb 9 10:27:27.136132 udevadm[1034]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 10:27:27.114493 systemd[1]: Starting systemd-udev-settle.service... Feb 9 10:27:27.117470 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:27:27.126552 systemd[1]: Finished systemd-sysusers.service. Feb 9 10:27:27.136657 systemd[1]: Finished systemd-journal-flush.service. Feb 9 10:27:27.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.453079 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 10:27:27.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.454000 audit: BPF prog-id=18 op=LOAD Feb 9 10:27:27.454000 audit: BPF prog-id=19 op=LOAD Feb 9 10:27:27.454000 audit: BPF prog-id=7 op=UNLOAD Feb 9 10:27:27.454000 audit: BPF prog-id=8 op=UNLOAD Feb 9 10:27:27.455211 systemd[1]: Starting systemd-udevd.service... Feb 9 10:27:27.472819 systemd-udevd[1036]: Using default interface naming scheme 'v252'. Feb 9 10:27:27.483942 systemd[1]: Started systemd-udevd.service. Feb 9 10:27:27.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.485000 audit: BPF prog-id=20 op=LOAD Feb 9 10:27:27.494026 systemd[1]: Starting systemd-networkd.service... Feb 9 10:27:27.514000 audit: BPF prog-id=21 op=LOAD Feb 9 10:27:27.514000 audit: BPF prog-id=22 op=LOAD Feb 9 10:27:27.514000 audit: BPF prog-id=23 op=LOAD Feb 9 10:27:27.515594 systemd[1]: Starting systemd-userdbd.service... Feb 9 10:27:27.518787 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 10:27:27.530587 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:27:27.549756 systemd[1]: Started systemd-userdbd.service. Feb 9 10:27:27.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.580675 systemd[1]: Finished systemd-udev-settle.service. Feb 9 10:27:27.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.582483 systemd[1]: Starting lvm2-activation-early.service... Feb 9 10:27:27.602499 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:27:27.602860 systemd-networkd[1043]: lo: Link UP Feb 9 10:27:27.602864 systemd-networkd[1043]: lo: Gained carrier Feb 9 10:27:27.603189 systemd-networkd[1043]: Enumeration completed Feb 9 10:27:27.603285 systemd[1]: Started systemd-networkd.service. Feb 9 10:27:27.603294 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:27:27.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.604893 systemd-networkd[1043]: eth0: Link UP Feb 9 10:27:27.604904 systemd-networkd[1043]: eth0: Gained carrier Feb 9 10:27:27.625429 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.4/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 10:27:27.631058 systemd[1]: Finished lvm2-activation-early.service. Feb 9 10:27:27.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.631885 systemd[1]: Reached target cryptsetup.target. Feb 9 10:27:27.633648 systemd[1]: Starting lvm2-activation.service... Feb 9 10:27:27.637189 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:27:27.667172 systemd[1]: Finished lvm2-activation.service. Feb 9 10:27:27.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.667900 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:27:27.668714 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 10:27:27.668739 systemd[1]: Reached target local-fs.target. Feb 9 10:27:27.669426 systemd[1]: Reached target machines.target. Feb 9 10:27:27.671101 systemd[1]: Starting ldconfig.service... Feb 9 10:27:27.672018 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 10:27:27.672098 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:27:27.673244 systemd[1]: Starting systemd-boot-update.service... Feb 9 10:27:27.675131 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 10:27:27.677070 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 10:27:27.677968 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:27:27.678019 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:27:27.679062 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 10:27:27.682073 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1072 (bootctl) Feb 9 10:27:27.683059 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 10:27:27.695533 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 10:27:27.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.697426 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:27:27.700896 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:27:27.706761 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:27:27.766562 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 10:27:27.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.771938 systemd-fsck[1083]: fsck.fat 4.2 (2021-01-31) Feb 9 10:27:27.771938 systemd-fsck[1083]: /dev/vda1: 236 files, 113719/258078 clusters Feb 9 10:27:27.774437 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 10:27:27.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:27.841570 ldconfig[1071]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 10:27:27.845600 systemd[1]: Finished ldconfig.service. Feb 9 10:27:27.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.061480 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 10:27:28.062858 systemd[1]: Mounting boot.mount... Feb 9 10:27:28.069398 systemd[1]: Mounted boot.mount. Feb 9 10:27:28.076008 systemd[1]: Finished systemd-boot-update.service. Feb 9 10:27:28.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.128461 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 10:27:28.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.130729 systemd[1]: Starting audit-rules.service... Feb 9 10:27:28.132365 systemd[1]: Starting clean-ca-certificates.service... Feb 9 10:27:28.137000 audit: BPF prog-id=24 op=LOAD Feb 9 10:27:28.134880 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 10:27:28.138429 systemd[1]: Starting systemd-resolved.service... Feb 9 10:27:28.140000 audit: BPF prog-id=25 op=LOAD Feb 9 10:27:28.141482 systemd[1]: Starting systemd-timesyncd.service... Feb 9 10:27:28.143282 systemd[1]: Starting systemd-update-utmp.service... Feb 9 10:27:28.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.144647 systemd[1]: Finished clean-ca-certificates.service. Feb 9 10:27:28.145805 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 10:27:28.155000 audit[1097]: SYSTEM_BOOT pid=1097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.157601 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 10:27:28.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.159646 systemd[1]: Starting systemd-update-done.service... Feb 9 10:27:28.161653 systemd[1]: Finished systemd-update-utmp.service. Feb 9 10:27:28.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.165029 systemd[1]: Finished systemd-update-done.service. Feb 9 10:27:28.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.182000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:27:28.182000 audit[1107]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe5f18f70 a2=420 a3=0 items=0 ppid=1086 pid=1107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.182000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:27:28.183244 augenrules[1107]: No rules Feb 9 10:27:28.183767 systemd[1]: Finished audit-rules.service. Feb 9 10:27:28.192178 systemd[1]: Started systemd-timesyncd.service. Feb 9 10:27:28.193070 systemd-timesyncd[1096]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 10:27:28.193165 systemd[1]: Reached target time-set.target. Feb 9 10:27:28.193482 systemd-timesyncd[1096]: Initial clock synchronization to Fri 2024-02-09 10:27:27.999678 UTC. Feb 9 10:27:28.198639 systemd-resolved[1092]: Positive Trust Anchors: Feb 9 10:27:28.198650 systemd-resolved[1092]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:27:28.198676 systemd-resolved[1092]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:27:28.208158 systemd-resolved[1092]: Defaulting to hostname 'linux'. Feb 9 10:27:28.209592 systemd[1]: Started systemd-resolved.service. Feb 9 10:27:28.210348 systemd[1]: Reached target network.target. Feb 9 10:27:28.210898 systemd[1]: Reached target nss-lookup.target. Feb 9 10:27:28.211485 systemd[1]: Reached target sysinit.target. Feb 9 10:27:28.212106 systemd[1]: Started motdgen.path. Feb 9 10:27:28.212683 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 10:27:28.213618 systemd[1]: Started logrotate.timer. Feb 9 10:27:28.214368 systemd[1]: Started mdadm.timer. Feb 9 10:27:28.214963 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 10:27:28.215664 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 10:27:28.215693 systemd[1]: Reached target paths.target. Feb 9 10:27:28.216360 systemd[1]: Reached target timers.target. Feb 9 10:27:28.217334 systemd[1]: Listening on dbus.socket. Feb 9 10:27:28.218924 systemd[1]: Starting docker.socket... Feb 9 10:27:28.221783 systemd[1]: Listening on sshd.socket. Feb 9 10:27:28.222563 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:27:28.222957 systemd[1]: Listening on docker.socket. Feb 9 10:27:28.223730 systemd[1]: Reached target sockets.target. Feb 9 10:27:28.224419 systemd[1]: Reached target basic.target. Feb 9 10:27:28.225080 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:27:28.225108 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:27:28.226060 systemd[1]: Starting containerd.service... Feb 9 10:27:28.227615 systemd[1]: Starting dbus.service... Feb 9 10:27:28.229154 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 10:27:28.230930 systemd[1]: Starting extend-filesystems.service... Feb 9 10:27:28.231708 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 10:27:28.232962 systemd[1]: Starting motdgen.service... Feb 9 10:27:28.234735 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 10:27:28.236982 systemd[1]: Starting prepare-critools.service... Feb 9 10:27:28.239689 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 10:27:28.241758 jq[1117]: false Feb 9 10:27:28.245168 systemd[1]: Starting sshd-keygen.service... Feb 9 10:27:28.247903 systemd[1]: Starting systemd-logind.service... Feb 9 10:27:28.248620 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:27:28.248710 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 10:27:28.249183 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 10:27:28.249931 systemd[1]: Starting update-engine.service... Feb 9 10:27:28.251732 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 10:27:28.254244 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 10:27:28.254443 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 10:27:28.254744 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 10:27:28.254889 systemd[1]: Finished motdgen.service. Feb 9 10:27:28.255391 jq[1137]: true Feb 9 10:27:28.257241 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 10:27:28.257428 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 10:27:28.258076 extend-filesystems[1118]: Found vda Feb 9 10:27:28.259179 extend-filesystems[1118]: Found vda1 Feb 9 10:27:28.260686 extend-filesystems[1118]: Found vda2 Feb 9 10:27:28.261844 extend-filesystems[1118]: Found vda3 Feb 9 10:27:28.261844 extend-filesystems[1118]: Found usr Feb 9 10:27:28.261844 extend-filesystems[1118]: Found vda4 Feb 9 10:27:28.261844 extend-filesystems[1118]: Found vda6 Feb 9 10:27:28.261844 extend-filesystems[1118]: Found vda7 Feb 9 10:27:28.261844 extend-filesystems[1118]: Found vda9 Feb 9 10:27:28.261844 extend-filesystems[1118]: Checking size of /dev/vda9 Feb 9 10:27:28.286360 jq[1141]: true Feb 9 10:27:28.286530 tar[1139]: ./ Feb 9 10:27:28.286530 tar[1139]: ./macvlan Feb 9 10:27:28.280413 systemd[1]: Started dbus.service. Feb 9 10:27:28.280198 dbus-daemon[1116]: [system] SELinux support is enabled Feb 9 10:27:28.283162 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 10:27:28.283184 systemd[1]: Reached target system-config.target. Feb 9 10:27:28.283907 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 10:27:28.283921 systemd[1]: Reached target user-config.target. Feb 9 10:27:28.291505 extend-filesystems[1118]: Resized partition /dev/vda9 Feb 9 10:27:28.293499 tar[1140]: crictl Feb 9 10:27:28.294342 extend-filesystems[1158]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 10:27:28.307441 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 10:27:28.308684 systemd-logind[1134]: Watching system buttons on /dev/input/event0 (Power Button) Feb 9 10:27:28.309254 systemd-logind[1134]: New seat seat0. Feb 9 10:27:28.312978 systemd[1]: Started systemd-logind.service. Feb 9 10:27:28.350334 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 10:27:28.366503 extend-filesystems[1158]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 10:27:28.366503 extend-filesystems[1158]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 10:27:28.366503 extend-filesystems[1158]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 10:27:28.370623 extend-filesystems[1118]: Resized filesystem in /dev/vda9 Feb 9 10:27:28.368081 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 10:27:28.371671 update_engine[1135]: I0209 10:27:28.366032 1135 main.cc:92] Flatcar Update Engine starting Feb 9 10:27:28.371834 bash[1165]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:27:28.368238 systemd[1]: Finished extend-filesystems.service. Feb 9 10:27:28.371888 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 10:27:28.373075 update_engine[1135]: I0209 10:27:28.372856 1135 update_check_scheduler.cc:74] Next update check in 2m42s Feb 9 10:27:28.373015 systemd[1]: Started update-engine.service. Feb 9 10:27:28.375230 systemd[1]: Started locksmithd.service. Feb 9 10:27:28.383131 tar[1139]: ./static Feb 9 10:27:28.402774 env[1142]: time="2024-02-09T10:27:28.402726160Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 10:27:28.407897 tar[1139]: ./vlan Feb 9 10:27:28.432348 env[1142]: time="2024-02-09T10:27:28.432286080Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 10:27:28.432592 env[1142]: time="2024-02-09T10:27:28.432473920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:27:28.433794 env[1142]: time="2024-02-09T10:27:28.433762080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:27:28.433861 env[1142]: time="2024-02-09T10:27:28.433795280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:27:28.434018 env[1142]: time="2024-02-09T10:27:28.433993640Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:27:28.434053 env[1142]: time="2024-02-09T10:27:28.434017920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 10:27:28.434053 env[1142]: time="2024-02-09T10:27:28.434032200Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 10:27:28.434053 env[1142]: time="2024-02-09T10:27:28.434042640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 10:27:28.434132 env[1142]: time="2024-02-09T10:27:28.434111800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:27:28.434369 env[1142]: time="2024-02-09T10:27:28.434346000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:27:28.434490 env[1142]: time="2024-02-09T10:27:28.434467360Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:27:28.434490 env[1142]: time="2024-02-09T10:27:28.434487080Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 10:27:28.434574 env[1142]: time="2024-02-09T10:27:28.434545640Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 10:27:28.434574 env[1142]: time="2024-02-09T10:27:28.434571920Z" level=info msg="metadata content store policy set" policy=shared Feb 9 10:27:28.438124 env[1142]: time="2024-02-09T10:27:28.438096240Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 10:27:28.438181 env[1142]: time="2024-02-09T10:27:28.438130200Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 10:27:28.438181 env[1142]: time="2024-02-09T10:27:28.438142560Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 10:27:28.438233 env[1142]: time="2024-02-09T10:27:28.438177560Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.438233 env[1142]: time="2024-02-09T10:27:28.438193560Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.438233 env[1142]: time="2024-02-09T10:27:28.438206680Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.438233 env[1142]: time="2024-02-09T10:27:28.438218120Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.438606 env[1142]: time="2024-02-09T10:27:28.438585480Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.438640 env[1142]: time="2024-02-09T10:27:28.438611120Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.438640 env[1142]: time="2024-02-09T10:27:28.438624720Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.438640 env[1142]: time="2024-02-09T10:27:28.438637800Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.438716 env[1142]: time="2024-02-09T10:27:28.438650600Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 10:27:28.438784 env[1142]: time="2024-02-09T10:27:28.438764360Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 10:27:28.438861 env[1142]: time="2024-02-09T10:27:28.438843640Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 10:27:28.439071 env[1142]: time="2024-02-09T10:27:28.439054720Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 10:27:28.439103 env[1142]: time="2024-02-09T10:27:28.439082280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439103 env[1142]: time="2024-02-09T10:27:28.439096160Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 10:27:28.439208 env[1142]: time="2024-02-09T10:27:28.439193560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439243 env[1142]: time="2024-02-09T10:27:28.439209360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439243 env[1142]: time="2024-02-09T10:27:28.439221280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439243 env[1142]: time="2024-02-09T10:27:28.439231960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439300 env[1142]: time="2024-02-09T10:27:28.439243640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439300 env[1142]: time="2024-02-09T10:27:28.439255040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439300 env[1142]: time="2024-02-09T10:27:28.439265520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439300 env[1142]: time="2024-02-09T10:27:28.439276640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439300 env[1142]: time="2024-02-09T10:27:28.439289160Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 10:27:28.439464 env[1142]: time="2024-02-09T10:27:28.439441600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439503 env[1142]: time="2024-02-09T10:27:28.439465000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439503 env[1142]: time="2024-02-09T10:27:28.439477520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439503 env[1142]: time="2024-02-09T10:27:28.439488520Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 10:27:28.439571 env[1142]: time="2024-02-09T10:27:28.439503440Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 10:27:28.439571 env[1142]: time="2024-02-09T10:27:28.439515280Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 10:27:28.439571 env[1142]: time="2024-02-09T10:27:28.439532160Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 10:27:28.439633 env[1142]: time="2024-02-09T10:27:28.439573520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 10:27:28.439843 env[1142]: time="2024-02-09T10:27:28.439794120Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 10:27:28.440471 env[1142]: time="2024-02-09T10:27:28.439852400Z" level=info msg="Connect containerd service" Feb 9 10:27:28.440471 env[1142]: time="2024-02-09T10:27:28.439883560Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 10:27:28.440530 env[1142]: time="2024-02-09T10:27:28.440507520Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:27:28.440855 env[1142]: time="2024-02-09T10:27:28.440817480Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 10:27:28.440899 env[1142]: time="2024-02-09T10:27:28.440861640Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 10:27:28.440981 systemd[1]: Started containerd.service. Feb 9 10:27:28.441976 tar[1139]: ./portmap Feb 9 10:27:28.446911 env[1142]: time="2024-02-09T10:27:28.446658920Z" level=info msg="containerd successfully booted in 0.044983s" Feb 9 10:27:28.447835 env[1142]: time="2024-02-09T10:27:28.446580080Z" level=info msg="Start subscribing containerd event" Feb 9 10:27:28.456354 env[1142]: time="2024-02-09T10:27:28.456301760Z" level=info msg="Start recovering state" Feb 9 10:27:28.456424 env[1142]: time="2024-02-09T10:27:28.456411800Z" level=info msg="Start event monitor" Feb 9 10:27:28.456447 env[1142]: time="2024-02-09T10:27:28.456434760Z" level=info msg="Start snapshots syncer" Feb 9 10:27:28.456468 env[1142]: time="2024-02-09T10:27:28.456445720Z" level=info msg="Start cni network conf syncer for default" Feb 9 10:27:28.456468 env[1142]: time="2024-02-09T10:27:28.456454040Z" level=info msg="Start streaming server" Feb 9 10:27:28.472981 tar[1139]: ./host-local Feb 9 10:27:28.489468 locksmithd[1172]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 10:27:28.500756 tar[1139]: ./vrf Feb 9 10:27:28.529827 tar[1139]: ./bridge Feb 9 10:27:28.563488 tar[1139]: ./tuning Feb 9 10:27:28.591281 tar[1139]: ./firewall Feb 9 10:27:28.626252 tar[1139]: ./host-device Feb 9 10:27:28.657472 tar[1139]: ./sbr Feb 9 10:27:28.685484 tar[1139]: ./loopback Feb 9 10:27:28.712625 tar[1139]: ./dhcp Feb 9 10:27:28.735136 systemd[1]: Finished prepare-critools.service. Feb 9 10:27:28.788303 tar[1139]: ./ptp Feb 9 10:27:28.820959 tar[1139]: ./ipvlan Feb 9 10:27:28.852772 tar[1139]: ./bandwidth Feb 9 10:27:28.893151 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 10:27:28.905456 systemd-networkd[1043]: eth0: Gained IPv6LL Feb 9 10:27:29.131929 sshd_keygen[1136]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 10:27:29.148603 systemd[1]: Finished sshd-keygen.service. Feb 9 10:27:29.150732 systemd[1]: Starting issuegen.service... Feb 9 10:27:29.154893 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 10:27:29.155031 systemd[1]: Finished issuegen.service. Feb 9 10:27:29.157016 systemd[1]: Starting systemd-user-sessions.service... Feb 9 10:27:29.164190 systemd[1]: Finished systemd-user-sessions.service. Feb 9 10:27:29.166086 systemd[1]: Started getty@tty1.service. Feb 9 10:27:29.167878 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 10:27:29.168763 systemd[1]: Reached target getty.target. Feb 9 10:27:29.169389 systemd[1]: Reached target multi-user.target. Feb 9 10:27:29.171026 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 10:27:29.177062 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 10:27:29.177214 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 10:27:29.178023 systemd[1]: Startup finished in 557ms (kernel) + 5.504s (initrd) + 4.096s (userspace) = 10.159s. Feb 9 10:27:32.801180 systemd[1]: Created slice system-sshd.slice. Feb 9 10:27:32.802233 systemd[1]: Started sshd@0-10.0.0.4:22-10.0.0.1:37890.service. Feb 9 10:27:32.842696 sshd[1200]: Accepted publickey for core from 10.0.0.1 port 37890 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:32.844763 sshd[1200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:32.852171 systemd[1]: Created slice user-500.slice. Feb 9 10:27:32.853142 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 10:27:32.854715 systemd-logind[1134]: New session 1 of user core. Feb 9 10:27:32.860575 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 10:27:32.861757 systemd[1]: Starting user@500.service... Feb 9 10:27:32.864135 (systemd)[1203]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:32.919114 systemd[1203]: Queued start job for default target default.target. Feb 9 10:27:32.919571 systemd[1203]: Reached target paths.target. Feb 9 10:27:32.919589 systemd[1203]: Reached target sockets.target. Feb 9 10:27:32.919600 systemd[1203]: Reached target timers.target. Feb 9 10:27:32.919610 systemd[1203]: Reached target basic.target. Feb 9 10:27:32.919691 systemd[1]: Started user@500.service. Feb 9 10:27:32.920335 systemd[1203]: Reached target default.target. Feb 9 10:27:32.920472 systemd[1]: Started session-1.scope. Feb 9 10:27:32.921153 systemd[1203]: Startup finished in 52ms. Feb 9 10:27:32.970526 systemd[1]: Started sshd@1-10.0.0.4:22-10.0.0.1:37902.service. Feb 9 10:27:33.006178 sshd[1212]: Accepted publickey for core from 10.0.0.1 port 37902 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:33.007577 sshd[1212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:33.010574 systemd-logind[1134]: New session 2 of user core. Feb 9 10:27:33.011325 systemd[1]: Started session-2.scope. Feb 9 10:27:33.064584 sshd[1212]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:33.067681 systemd[1]: Started sshd@2-10.0.0.4:22-10.0.0.1:37912.service. Feb 9 10:27:33.068128 systemd[1]: sshd@1-10.0.0.4:22-10.0.0.1:37902.service: Deactivated successfully. Feb 9 10:27:33.068793 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 10:27:33.069249 systemd-logind[1134]: Session 2 logged out. Waiting for processes to exit. Feb 9 10:27:33.069910 systemd-logind[1134]: Removed session 2. Feb 9 10:27:33.103032 sshd[1217]: Accepted publickey for core from 10.0.0.1 port 37912 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:33.104415 sshd[1217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:33.107147 systemd-logind[1134]: New session 3 of user core. Feb 9 10:27:33.107898 systemd[1]: Started session-3.scope. Feb 9 10:27:33.154964 sshd[1217]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:33.157461 systemd[1]: sshd@2-10.0.0.4:22-10.0.0.1:37912.service: Deactivated successfully. Feb 9 10:27:33.158067 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 10:27:33.158522 systemd-logind[1134]: Session 3 logged out. Waiting for processes to exit. Feb 9 10:27:33.159462 systemd[1]: Started sshd@3-10.0.0.4:22-10.0.0.1:37926.service. Feb 9 10:27:33.159992 systemd-logind[1134]: Removed session 3. Feb 9 10:27:33.194695 sshd[1224]: Accepted publickey for core from 10.0.0.1 port 37926 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:33.195955 sshd[1224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:33.198815 systemd-logind[1134]: New session 4 of user core. Feb 9 10:27:33.199589 systemd[1]: Started session-4.scope. Feb 9 10:27:33.250657 sshd[1224]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:33.253935 systemd[1]: sshd@3-10.0.0.4:22-10.0.0.1:37926.service: Deactivated successfully. Feb 9 10:27:33.254591 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 10:27:33.255058 systemd-logind[1134]: Session 4 logged out. Waiting for processes to exit. Feb 9 10:27:33.256008 systemd[1]: Started sshd@4-10.0.0.4:22-10.0.0.1:37942.service. Feb 9 10:27:33.256613 systemd-logind[1134]: Removed session 4. Feb 9 10:27:33.291512 sshd[1230]: Accepted publickey for core from 10.0.0.1 port 37942 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:33.292558 sshd[1230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:33.295631 systemd-logind[1134]: New session 5 of user core. Feb 9 10:27:33.296382 systemd[1]: Started session-5.scope. Feb 9 10:27:33.355968 sudo[1233]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 10:27:33.356170 sudo[1233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:27:33.368555 dbus-daemon[1116]: avc: received setenforce notice (enforcing=1) Feb 9 10:27:33.370212 sudo[1233]: pam_unix(sudo:session): session closed for user root Feb 9 10:27:33.374016 sshd[1230]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:33.376708 systemd[1]: sshd@4-10.0.0.4:22-10.0.0.1:37942.service: Deactivated successfully. Feb 9 10:27:33.377457 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 10:27:33.378268 systemd-logind[1134]: Session 5 logged out. Waiting for processes to exit. Feb 9 10:27:33.379801 systemd[1]: Started sshd@5-10.0.0.4:22-10.0.0.1:37952.service. Feb 9 10:27:33.380678 systemd-logind[1134]: Removed session 5. Feb 9 10:27:33.415498 sshd[1237]: Accepted publickey for core from 10.0.0.1 port 37952 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:33.416536 sshd[1237]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:33.419478 systemd-logind[1134]: New session 6 of user core. Feb 9 10:27:33.420144 systemd[1]: Started session-6.scope. Feb 9 10:27:33.469978 sudo[1241]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 10:27:33.470186 sudo[1241]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:27:33.472640 sudo[1241]: pam_unix(sudo:session): session closed for user root Feb 9 10:27:33.476538 sudo[1240]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 10:27:33.476936 sudo[1240]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:27:33.485107 systemd[1]: Stopping audit-rules.service... Feb 9 10:27:33.485000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:27:33.486245 auditctl[1244]: No rules Feb 9 10:27:33.486545 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 10:27:33.486629 kernel: kauditd_printk_skb: 124 callbacks suppressed Feb 9 10:27:33.486655 kernel: audit: type=1305 audit(1707474453.485:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:27:33.486698 systemd[1]: Stopped audit-rules.service. Feb 9 10:27:33.485000 audit[1244]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd3f22a80 a2=420 a3=0 items=0 ppid=1 pid=1244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:33.488040 systemd[1]: Starting audit-rules.service... Feb 9 10:27:33.490283 kernel: audit: type=1300 audit(1707474453.485:157): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd3f22a80 a2=420 a3=0 items=0 ppid=1 pid=1244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:33.490340 kernel: audit: type=1327 audit(1707474453.485:157): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:27:33.485000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:27:33.491411 kernel: audit: type=1131 audit(1707474453.486:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.503203 augenrules[1261]: No rules Feb 9 10:27:33.503832 systemd[1]: Finished audit-rules.service. Feb 9 10:27:33.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.504661 sudo[1240]: pam_unix(sudo:session): session closed for user root Feb 9 10:27:33.504000 audit[1240]: USER_END pid=1240 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.506745 sshd[1237]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:33.508307 kernel: audit: type=1130 audit(1707474453.503:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.508366 kernel: audit: type=1106 audit(1707474453.504:160): pid=1240 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.504000 audit[1240]: CRED_DISP pid=1240 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.510207 kernel: audit: type=1104 audit(1707474453.504:161): pid=1240 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.510259 kernel: audit: type=1106 audit(1707474453.508:162): pid=1237 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:33.508000 audit[1237]: USER_END pid=1237 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:33.510246 systemd[1]: Started sshd@6-10.0.0.4:22-10.0.0.1:37964.service. Feb 9 10:27:33.511437 systemd[1]: sshd@5-10.0.0.4:22-10.0.0.1:37952.service: Deactivated successfully. Feb 9 10:27:33.512097 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 10:27:33.512651 systemd-logind[1134]: Session 6 logged out. Waiting for processes to exit. Feb 9 10:27:33.508000 audit[1237]: CRED_DISP pid=1237 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:33.513636 systemd-logind[1134]: Removed session 6. Feb 9 10:27:33.514868 kernel: audit: type=1104 audit(1707474453.508:163): pid=1237 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:33.514917 kernel: audit: type=1130 audit(1707474453.509:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:37964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:37964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.4:22-10.0.0.1:37952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.546000 audit[1266]: USER_ACCT pid=1266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:33.547612 sshd[1266]: Accepted publickey for core from 10.0.0.1 port 37964 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:33.547000 audit[1266]: CRED_ACQ pid=1266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:33.547000 audit[1266]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7c26020 a2=3 a3=1 items=0 ppid=1 pid=1266 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:33.547000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:27:33.548970 sshd[1266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:33.552206 systemd-logind[1134]: New session 7 of user core. Feb 9 10:27:33.552552 systemd[1]: Started session-7.scope. Feb 9 10:27:33.555000 audit[1266]: USER_START pid=1266 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:33.556000 audit[1269]: CRED_ACQ pid=1269 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:33.602853 sudo[1270]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 10:27:33.603052 sudo[1270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:27:33.601000 audit[1270]: USER_ACCT pid=1270 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.601000 audit[1270]: CRED_REFR pid=1270 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:33.603000 audit[1270]: USER_START pid=1270 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.113476 systemd[1]: Reloading. Feb 9 10:27:34.158555 /usr/lib/systemd/system-generators/torcx-generator[1300]: time="2024-02-09T10:27:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:27:34.158844 /usr/lib/systemd/system-generators/torcx-generator[1300]: time="2024-02-09T10:27:34Z" level=info msg="torcx already run" Feb 9 10:27:34.209961 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:27:34.209978 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:27:34.224605 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit: BPF prog-id=31 op=LOAD Feb 9 10:27:34.269000 audit: BPF prog-id=25 op=UNLOAD Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit: BPF prog-id=32 op=LOAD Feb 9 10:27:34.270000 audit: BPF prog-id=29 op=UNLOAD Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit: BPF prog-id=33 op=LOAD Feb 9 10:27:34.270000 audit: BPF prog-id=21 op=UNLOAD Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit: BPF prog-id=34 op=LOAD Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.270000 audit: BPF prog-id=35 op=LOAD Feb 9 10:27:34.270000 audit: BPF prog-id=22 op=UNLOAD Feb 9 10:27:34.270000 audit: BPF prog-id=23 op=UNLOAD Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit: BPF prog-id=36 op=LOAD Feb 9 10:27:34.272000 audit: BPF prog-id=15 op=UNLOAD Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit: BPF prog-id=37 op=LOAD Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.272000 audit: BPF prog-id=38 op=LOAD Feb 9 10:27:34.272000 audit: BPF prog-id=16 op=UNLOAD Feb 9 10:27:34.272000 audit: BPF prog-id=17 op=UNLOAD Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit: BPF prog-id=39 op=LOAD Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.273000 audit: BPF prog-id=40 op=LOAD Feb 9 10:27:34.273000 audit: BPF prog-id=18 op=UNLOAD Feb 9 10:27:34.273000 audit: BPF prog-id=19 op=UNLOAD Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit: BPF prog-id=41 op=LOAD Feb 9 10:27:34.274000 audit: BPF prog-id=26 op=UNLOAD Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit: BPF prog-id=42 op=LOAD Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.274000 audit: BPF prog-id=43 op=LOAD Feb 9 10:27:34.274000 audit: BPF prog-id=27 op=UNLOAD Feb 9 10:27:34.274000 audit: BPF prog-id=28 op=UNLOAD Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.275000 audit: BPF prog-id=44 op=LOAD Feb 9 10:27:34.275000 audit: BPF prog-id=24 op=UNLOAD Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.277000 audit: BPF prog-id=45 op=LOAD Feb 9 10:27:34.277000 audit: BPF prog-id=20 op=UNLOAD Feb 9 10:27:34.283982 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:27:34.290277 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:27:34.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.290902 systemd[1]: Reached target network-online.target. Feb 9 10:27:34.292533 systemd[1]: Started kubelet.service. Feb 9 10:27:34.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.304971 systemd[1]: Starting coreos-metadata.service... Feb 9 10:27:34.311355 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 9 10:27:34.311529 systemd[1]: Finished coreos-metadata.service. Feb 9 10:27:34.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.459461 kubelet[1338]: E0209 10:27:34.459274 1338 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:27:34.461907 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:27:34.462038 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:27:34.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:27:34.591462 systemd[1]: Stopped kubelet.service. Feb 9 10:27:34.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.605235 systemd[1]: Reloading. Feb 9 10:27:34.679659 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2024-02-09T10:27:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:27:34.679937 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2024-02-09T10:27:34Z" level=info msg="torcx already run" Feb 9 10:27:34.729852 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:27:34.729873 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:27:34.744622 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit: BPF prog-id=46 op=LOAD Feb 9 10:27:34.795000 audit: BPF prog-id=31 op=UNLOAD Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit: BPF prog-id=47 op=LOAD Feb 9 10:27:34.795000 audit: BPF prog-id=32 op=UNLOAD Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit: BPF prog-id=48 op=LOAD Feb 9 10:27:34.796000 audit: BPF prog-id=33 op=UNLOAD Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit: BPF prog-id=49 op=LOAD Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.796000 audit: BPF prog-id=50 op=LOAD Feb 9 10:27:34.796000 audit: BPF prog-id=34 op=UNLOAD Feb 9 10:27:34.796000 audit: BPF prog-id=35 op=UNLOAD Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit: BPF prog-id=51 op=LOAD Feb 9 10:27:34.798000 audit: BPF prog-id=36 op=UNLOAD Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit: BPF prog-id=52 op=LOAD Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit: BPF prog-id=53 op=LOAD Feb 9 10:27:34.798000 audit: BPF prog-id=37 op=UNLOAD Feb 9 10:27:34.798000 audit: BPF prog-id=38 op=UNLOAD Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit: BPF prog-id=54 op=LOAD Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.798000 audit: BPF prog-id=55 op=LOAD Feb 9 10:27:34.798000 audit: BPF prog-id=39 op=UNLOAD Feb 9 10:27:34.798000 audit: BPF prog-id=40 op=UNLOAD Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit: BPF prog-id=56 op=LOAD Feb 9 10:27:34.800000 audit: BPF prog-id=41 op=UNLOAD Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit: BPF prog-id=57 op=LOAD Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.800000 audit: BPF prog-id=58 op=LOAD Feb 9 10:27:34.800000 audit: BPF prog-id=42 op=UNLOAD Feb 9 10:27:34.800000 audit: BPF prog-id=43 op=UNLOAD Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.801000 audit: BPF prog-id=59 op=LOAD Feb 9 10:27:34.801000 audit: BPF prog-id=44 op=UNLOAD Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.802000 audit: BPF prog-id=60 op=LOAD Feb 9 10:27:34.802000 audit: BPF prog-id=45 op=UNLOAD Feb 9 10:27:34.822531 systemd[1]: Started kubelet.service. Feb 9 10:27:34.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.859484 kubelet[1443]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:27:34.859484 kubelet[1443]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:27:34.859782 kubelet[1443]: I0209 10:27:34.859597 1443 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:27:34.860752 kubelet[1443]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:27:34.860752 kubelet[1443]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:27:36.061983 kubelet[1443]: I0209 10:27:36.061940 1443 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:27:36.061983 kubelet[1443]: I0209 10:27:36.061972 1443 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:27:36.062327 kubelet[1443]: I0209 10:27:36.062204 1443 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:27:36.065738 kubelet[1443]: I0209 10:27:36.065703 1443 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:27:36.069104 kubelet[1443]: W0209 10:27:36.069081 1443 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:27:36.069832 kubelet[1443]: I0209 10:27:36.069815 1443 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:27:36.070196 kubelet[1443]: I0209 10:27:36.070181 1443 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:27:36.070264 kubelet[1443]: I0209 10:27:36.070251 1443 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:27:36.070381 kubelet[1443]: I0209 10:27:36.070277 1443 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:27:36.070381 kubelet[1443]: I0209 10:27:36.070290 1443 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:27:36.070464 kubelet[1443]: I0209 10:27:36.070449 1443 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:27:36.074446 kubelet[1443]: I0209 10:27:36.074372 1443 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:27:36.074446 kubelet[1443]: I0209 10:27:36.074396 1443 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:27:36.074644 kubelet[1443]: I0209 10:27:36.074565 1443 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:27:36.074644 kubelet[1443]: I0209 10:27:36.074578 1443 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:27:36.074644 kubelet[1443]: E0209 10:27:36.074606 1443 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:36.074903 kubelet[1443]: E0209 10:27:36.074828 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:36.075746 kubelet[1443]: I0209 10:27:36.075726 1443 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:27:36.076480 kubelet[1443]: W0209 10:27:36.076465 1443 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 10:27:36.076990 kubelet[1443]: I0209 10:27:36.076974 1443 server.go:1186] "Started kubelet" Feb 9 10:27:36.077428 kubelet[1443]: I0209 10:27:36.077406 1443 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:27:36.076000 audit[1443]: AVC avc: denied { mac_admin } for pid=1443 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:36.076000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:36.076000 audit[1443]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40011c6510 a1=40005a1620 a2=40011c64e0 a3=25 items=0 ppid=1 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.076000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:36.078371 kubelet[1443]: I0209 10:27:36.078357 1443 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:27:36.077000 audit[1443]: AVC avc: denied { mac_admin } for pid=1443 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:36.077000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:36.077000 audit[1443]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40001311a0 a1=40005a1638 a2=40011c65a0 a3=25 items=0 ppid=1 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.077000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:36.078641 kubelet[1443]: I0209 10:27:36.078628 1443 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:27:36.078735 kubelet[1443]: I0209 10:27:36.078675 1443 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:27:36.078772 kubelet[1443]: E0209 10:27:36.078735 1443 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:27:36.078772 kubelet[1443]: E0209 10:27:36.078753 1443 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:27:36.078876 kubelet[1443]: I0209 10:27:36.078862 1443 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:27:36.079192 kubelet[1443]: I0209 10:27:36.079168 1443 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:27:36.079435 kubelet[1443]: E0209 10:27:36.079417 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:36.079843 kubelet[1443]: I0209 10:27:36.079791 1443 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:27:36.091419 kubelet[1443]: W0209 10:27:36.091379 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:27:36.091550 kubelet[1443]: E0209 10:27:36.091537 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:27:36.091731 kubelet[1443]: W0209 10:27:36.091710 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:27:36.091802 kubelet[1443]: E0209 10:27:36.091791 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:27:36.091896 kubelet[1443]: W0209 10:27:36.091884 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:27:36.091964 kubelet[1443]: E0209 10:27:36.091952 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:27:36.092070 kubelet[1443]: E0209 10:27:36.092054 1443 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:27:36.092348 kubelet[1443]: E0209 10:27:36.092220 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a184bf2a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 76926762, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 76926762, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.094496 kubelet[1443]: E0209 10:27:36.093384 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a1a07b6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 78744428, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 78744428, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.102061 kubelet[1443]: I0209 10:27:36.102017 1443 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:27:36.102061 kubelet[1443]: I0209 10:27:36.102040 1443 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:27:36.102061 kubelet[1443]: I0209 10:27:36.102060 1443 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:27:36.102625 kubelet[1443]: E0209 10:27:36.102559 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa0eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101392055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101392055, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.103492 kubelet[1443]: E0209 10:27:36.103434 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa5c90", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101411984, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101411984, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.103949 kubelet[1443]: I0209 10:27:36.103926 1443 policy_none.go:49] "None policy: Start" Feb 9 10:27:36.104517 kubelet[1443]: I0209 10:27:36.104500 1443 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:27:36.104581 kubelet[1443]: I0209 10:27:36.104572 1443 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:27:36.104651 kubelet[1443]: E0209 10:27:36.104582 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa66ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101414638, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101414638, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.105000 audit[1459]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.105000 audit[1459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe0cc5ff0 a2=0 a3=1 items=0 ppid=1443 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:27:36.107000 audit[1462]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.107000 audit[1462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffde750e10 a2=0 a3=1 items=0 ppid=1443 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:27:36.109109 systemd[1]: Created slice kubepods.slice. Feb 9 10:27:36.113090 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 10:27:36.115566 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 10:27:36.127043 kubelet[1443]: I0209 10:27:36.127017 1443 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:27:36.127112 kubelet[1443]: I0209 10:27:36.127077 1443 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:27:36.126000 audit[1443]: AVC avc: denied { mac_admin } for pid=1443 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:36.126000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:36.126000 audit[1443]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d0cc90 a1=400065e2e8 a2=4000d0cc60 a3=25 items=0 ppid=1 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.126000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:36.127329 kubelet[1443]: I0209 10:27:36.127244 1443 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:27:36.127778 kubelet[1443]: E0209 10:27:36.127758 1443 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.4\" not found" Feb 9 10:27:36.129279 kubelet[1443]: E0209 10:27:36.129208 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a4964804", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 128407556, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 128407556, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.109000 audit[1464]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.109000 audit[1464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc4219a10 a2=0 a3=1 items=0 ppid=1443 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:27:36.136000 audit[1469]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.136000 audit[1469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd9d86ba0 a2=0 a3=1 items=0 ppid=1443 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:27:36.165000 audit[1474]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.165000 audit[1474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd64880f0 a2=0 a3=1 items=0 ppid=1443 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 10:27:36.166000 audit[1475]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.166000 audit[1475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffeaa2c220 a2=0 a3=1 items=0 ppid=1443 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:27:36.170000 audit[1478]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.170000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd0e1a3a0 a2=0 a3=1 items=0 ppid=1443 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:27:36.174000 audit[1481]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.174000 audit[1481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffce8967f0 a2=0 a3=1 items=0 ppid=1443 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:27:36.175000 audit[1482]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.175000 audit[1482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffca10e1b0 a2=0 a3=1 items=0 ppid=1443 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:27:36.176000 audit[1483]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.176000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda5492f0 a2=0 a3=1 items=0 ppid=1443 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:27:36.178000 audit[1485]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.178000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd8a98be0 a2=0 a3=1 items=0 ppid=1443 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:27:36.180405 kubelet[1443]: I0209 10:27:36.180381 1443 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 10:27:36.181687 kubelet[1443]: E0209 10:27:36.181665 1443 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 10:27:36.181784 kubelet[1443]: E0209 10:27:36.181665 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa0eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101392055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 180298896, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa0eb7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.182645 kubelet[1443]: E0209 10:27:36.182596 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa5c90", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101411984, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 180347986, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa5c90" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.183439 kubelet[1443]: E0209 10:27:36.183377 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa66ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101414638, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 180351552, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa66ee" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.180000 audit[1487]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.180000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff38107a0 a2=0 a3=1 items=0 ppid=1443 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:27:36.206000 audit[1490]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.206000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffe2dee5e0 a2=0 a3=1 items=0 ppid=1443 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:27:36.208000 audit[1492]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.208000 audit[1492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffeb4c67d0 a2=0 a3=1 items=0 ppid=1443 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:27:36.215000 audit[1495]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.215000 audit[1495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffe5bc69f0 a2=0 a3=1 items=0 ppid=1443 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:27:36.216341 kubelet[1443]: I0209 10:27:36.216320 1443 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:27:36.216000 audit[1496]: NETFILTER_CFG table=mangle:17 family=10 entries=2 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.216000 audit[1496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd2085660 a2=0 a3=1 items=0 ppid=1443 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:27:36.217000 audit[1497]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.217000 audit[1497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6825f70 a2=0 a3=1 items=0 ppid=1443 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:27:36.217000 audit[1498]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.217000 audit[1498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff91d4880 a2=0 a3=1 items=0 ppid=1443 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:27:36.218000 audit[1500]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.218000 audit[1500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce6a6a80 a2=0 a3=1 items=0 ppid=1443 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:27:36.219000 audit[1501]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1501 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:36.219000 audit[1501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe54d3010 a2=0 a3=1 items=0 ppid=1443 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:27:36.220000 audit[1502]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.220000 audit[1502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc07ab9b0 a2=0 a3=1 items=0 ppid=1443 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:27:36.221000 audit[1503]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.221000 audit[1503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd37373a0 a2=0 a3=1 items=0 ppid=1443 pid=1503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:27:36.223000 audit[1505]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.223000 audit[1505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=fffff2cc8a50 a2=0 a3=1 items=0 ppid=1443 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:27:36.224000 audit[1506]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1506 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.224000 audit[1506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff8bd4f10 a2=0 a3=1 items=0 ppid=1443 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:27:36.225000 audit[1507]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1507 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.225000 audit[1507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9088d70 a2=0 a3=1 items=0 ppid=1443 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:27:36.226000 audit[1509]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1509 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.226000 audit[1509]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdcdd38c0 a2=0 a3=1 items=0 ppid=1443 pid=1509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:27:36.228000 audit[1511]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1511 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.228000 audit[1511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcf358300 a2=0 a3=1 items=0 ppid=1443 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:27:36.230000 audit[1513]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1513 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.230000 audit[1513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=fffff7849250 a2=0 a3=1 items=0 ppid=1443 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:27:36.233000 audit[1515]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1515 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.233000 audit[1515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffc336b520 a2=0 a3=1 items=0 ppid=1443 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:27:36.235000 audit[1517]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1517 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.235000 audit[1517]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=fffff4f54f40 a2=0 a3=1 items=0 ppid=1443 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:27:36.236527 kubelet[1443]: I0209 10:27:36.236500 1443 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:27:36.236527 kubelet[1443]: I0209 10:27:36.236527 1443 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:27:36.236614 kubelet[1443]: I0209 10:27:36.236548 1443 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:27:36.236614 kubelet[1443]: E0209 10:27:36.236599 1443 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 10:27:36.238058 kubelet[1443]: W0209 10:27:36.238028 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:27:36.238058 kubelet[1443]: E0209 10:27:36.238060 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:27:36.237000 audit[1518]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.237000 audit[1518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffefd4c560 a2=0 a3=1 items=0 ppid=1443 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:27:36.238000 audit[1519]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1519 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.238000 audit[1519]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf67c500 a2=0 a3=1 items=0 ppid=1443 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:27:36.239000 audit[1520]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:36.239000 audit[1520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6cac0c0 a2=0 a3=1 items=0 ppid=1443 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:36.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:27:36.293532 kubelet[1443]: E0209 10:27:36.293504 1443 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:27:36.383025 kubelet[1443]: I0209 10:27:36.382932 1443 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 10:27:36.384597 kubelet[1443]: E0209 10:27:36.384522 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa0eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101392055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 382889956, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa0eb7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.384779 kubelet[1443]: E0209 10:27:36.384587 1443 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 10:27:36.385437 kubelet[1443]: E0209 10:27:36.385349 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa5c90", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101411984, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 382902832, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa5c90" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.480697 kubelet[1443]: E0209 10:27:36.480605 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa66ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101414638, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 382906279, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa66ee" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.696645 kubelet[1443]: E0209 10:27:36.696551 1443 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:27:36.785708 kubelet[1443]: I0209 10:27:36.785675 1443 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 10:27:36.786514 kubelet[1443]: E0209 10:27:36.786490 1443 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 10:27:36.786737 kubelet[1443]: E0209 10:27:36.786671 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa0eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101392055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 785639538, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa0eb7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.880021 kubelet[1443]: E0209 10:27:36.879957 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa5c90", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101411984, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 785648017, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa5c90" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:36.900864 kubelet[1443]: W0209 10:27:36.900842 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:27:36.900955 kubelet[1443]: E0209 10:27:36.900945 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:27:37.075596 kubelet[1443]: E0209 10:27:37.075502 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:37.079742 kubelet[1443]: E0209 10:27:37.079653 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa66ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101414638, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 785650989, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa66ee" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:37.254263 kubelet[1443]: W0209 10:27:37.254223 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:27:37.254263 kubelet[1443]: E0209 10:27:37.254259 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:27:37.320587 kubelet[1443]: W0209 10:27:37.320557 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:27:37.320587 kubelet[1443]: E0209 10:27:37.320582 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:27:37.321351 kubelet[1443]: W0209 10:27:37.321327 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:27:37.321351 kubelet[1443]: E0209 10:27:37.321350 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:27:37.498487 kubelet[1443]: E0209 10:27:37.498388 1443 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:27:37.587237 kubelet[1443]: I0209 10:27:37.587214 1443 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 10:27:37.588134 kubelet[1443]: E0209 10:27:37.588079 1443 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 10:27:37.588388 kubelet[1443]: E0209 10:27:37.588294 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa0eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101392055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 37, 587151227, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa0eb7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:37.589376 kubelet[1443]: E0209 10:27:37.589274 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa5c90", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101411984, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 37, 587185580, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa5c90" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:37.679698 kubelet[1443]: E0209 10:27:37.679593 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa66ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101414638, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 37, 587188594, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa66ee" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:38.075997 kubelet[1443]: E0209 10:27:38.075961 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:39.076991 kubelet[1443]: E0209 10:27:39.076944 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:39.099714 kubelet[1443]: E0209 10:27:39.099685 1443 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:27:39.189687 kubelet[1443]: I0209 10:27:39.189665 1443 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 10:27:39.191218 kubelet[1443]: E0209 10:27:39.191191 1443 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 10:27:39.191218 kubelet[1443]: E0209 10:27:39.191166 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa0eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101392055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 39, 189613817, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa0eb7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:39.192156 kubelet[1443]: E0209 10:27:39.192087 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa5c90", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101411984, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 39, 189625264, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa5c90" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:39.192878 kubelet[1443]: E0209 10:27:39.192809 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa66ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101414638, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 39, 189628165, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa66ee" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:39.277858 kubelet[1443]: W0209 10:27:39.277819 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:27:39.277858 kubelet[1443]: E0209 10:27:39.277849 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:27:39.370202 kubelet[1443]: W0209 10:27:39.370114 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:27:39.370202 kubelet[1443]: E0209 10:27:39.370145 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:27:40.078058 kubelet[1443]: E0209 10:27:40.078003 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:40.276243 kubelet[1443]: W0209 10:27:40.276201 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:27:40.276243 kubelet[1443]: E0209 10:27:40.276230 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:27:40.428067 kubelet[1443]: W0209 10:27:40.428029 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:27:40.428067 kubelet[1443]: E0209 10:27:40.428063 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:27:41.078902 kubelet[1443]: E0209 10:27:41.078870 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:42.080229 kubelet[1443]: E0209 10:27:42.080179 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:42.301540 kubelet[1443]: E0209 10:27:42.301509 1443 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:27:42.392627 kubelet[1443]: I0209 10:27:42.392607 1443 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 10:27:42.393997 kubelet[1443]: E0209 10:27:42.393975 1443 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 10:27:42.394105 kubelet[1443]: E0209 10:27:42.393968 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa0eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101392055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 42, 392563354, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa0eb7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:42.395065 kubelet[1443]: E0209 10:27:42.394990 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa5c90", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101411984, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 42, 392574546, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa5c90" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:42.395758 kubelet[1443]: E0209 10:27:42.395709 1443 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b22af8a2fa66ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 36, 101414638, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 42, 392581715, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b22af8a2fa66ee" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:27:42.831633 kubelet[1443]: W0209 10:27:42.831534 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:27:42.831790 kubelet[1443]: E0209 10:27:42.831777 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:27:43.080617 kubelet[1443]: E0209 10:27:43.080554 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:43.480151 kubelet[1443]: W0209 10:27:43.480114 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:27:43.480151 kubelet[1443]: E0209 10:27:43.480146 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:27:44.067704 kubelet[1443]: W0209 10:27:44.067668 1443 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:27:44.067704 kubelet[1443]: E0209 10:27:44.067703 1443 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:27:44.080954 kubelet[1443]: E0209 10:27:44.080923 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:45.081506 kubelet[1443]: E0209 10:27:45.081472 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:46.066046 kubelet[1443]: I0209 10:27:46.066001 1443 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 10:27:46.082615 kubelet[1443]: E0209 10:27:46.082596 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:46.128640 kubelet[1443]: E0209 10:27:46.128612 1443 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.4\" not found" Feb 9 10:27:46.438594 kubelet[1443]: E0209 10:27:46.438570 1443 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.4" not found Feb 9 10:27:47.083611 kubelet[1443]: E0209 10:27:47.083570 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:47.694118 kubelet[1443]: E0209 10:27:47.694074 1443 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.4" not found Feb 9 10:27:48.084400 kubelet[1443]: E0209 10:27:48.084328 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:48.706172 kubelet[1443]: E0209 10:27:48.706124 1443 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.4\" not found" node="10.0.0.4" Feb 9 10:27:48.795171 kubelet[1443]: I0209 10:27:48.795137 1443 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 10:27:49.085774 kubelet[1443]: E0209 10:27:49.085647 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:49.095209 kubelet[1443]: I0209 10:27:49.095172 1443 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.4" Feb 9 10:27:49.106897 kubelet[1443]: E0209 10:27:49.106867 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:49.207427 kubelet[1443]: E0209 10:27:49.207384 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:49.308068 kubelet[1443]: E0209 10:27:49.308028 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:49.336603 kernel: kauditd_printk_skb: 474 callbacks suppressed Feb 9 10:27:49.336699 kernel: audit: type=1106 audit(1707474469.334:562): pid=1270 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:49.334000 audit[1270]: USER_END pid=1270 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:49.336021 sudo[1270]: pam_unix(sudo:session): session closed for user root Feb 9 10:27:49.337933 sshd[1266]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:49.335000 audit[1270]: CRED_DISP pid=1270 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:49.340339 systemd[1]: sshd@6-10.0.0.4:22-10.0.0.1:37964.service: Deactivated successfully. Feb 9 10:27:49.340896 kernel: audit: type=1104 audit(1707474469.335:563): pid=1270 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:49.340938 kernel: audit: type=1106 audit(1707474469.337:564): pid=1266 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.337000 audit[1266]: USER_END pid=1266 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.341029 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 10:27:49.341558 systemd-logind[1134]: Session 7 logged out. Waiting for processes to exit. Feb 9 10:27:49.342398 systemd-logind[1134]: Removed session 7. Feb 9 10:27:49.343343 kernel: audit: type=1104 audit(1707474469.337:565): pid=1266 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.337000 audit[1266]: CRED_DISP pid=1266 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:37964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:49.347206 kernel: audit: type=1131 audit(1707474469.339:566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:37964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:49.408614 kubelet[1443]: E0209 10:27:49.408584 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:49.509323 kubelet[1443]: E0209 10:27:49.509301 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:49.609938 kubelet[1443]: E0209 10:27:49.609858 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:49.710366 kubelet[1443]: E0209 10:27:49.710343 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:49.810861 kubelet[1443]: E0209 10:27:49.810838 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:49.911900 kubelet[1443]: E0209 10:27:49.911867 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.012234 kubelet[1443]: E0209 10:27:50.012209 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.085945 kubelet[1443]: E0209 10:27:50.085909 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:50.113187 kubelet[1443]: E0209 10:27:50.113159 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.213717 kubelet[1443]: E0209 10:27:50.213656 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.314208 kubelet[1443]: E0209 10:27:50.314179 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.414697 kubelet[1443]: E0209 10:27:50.414668 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.515242 kubelet[1443]: E0209 10:27:50.515175 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.615556 kubelet[1443]: E0209 10:27:50.615529 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.716048 kubelet[1443]: E0209 10:27:50.716021 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.816589 kubelet[1443]: E0209 10:27:50.816533 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:50.917040 kubelet[1443]: E0209 10:27:50.917015 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.017383 kubelet[1443]: E0209 10:27:51.017355 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.086261 kubelet[1443]: E0209 10:27:51.086178 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:51.119960 kubelet[1443]: E0209 10:27:51.119915 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.220484 kubelet[1443]: E0209 10:27:51.220455 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.320889 kubelet[1443]: E0209 10:27:51.320849 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.421564 kubelet[1443]: E0209 10:27:51.421521 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.522156 kubelet[1443]: E0209 10:27:51.522114 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.622842 kubelet[1443]: E0209 10:27:51.622798 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.723415 kubelet[1443]: E0209 10:27:51.723302 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.824319 kubelet[1443]: E0209 10:27:51.824290 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:51.924821 kubelet[1443]: E0209 10:27:51.924800 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.025355 kubelet[1443]: E0209 10:27:52.025267 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.087302 kubelet[1443]: E0209 10:27:52.087260 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:52.125520 kubelet[1443]: E0209 10:27:52.125493 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.226145 kubelet[1443]: E0209 10:27:52.226119 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.326822 kubelet[1443]: E0209 10:27:52.326675 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.427213 kubelet[1443]: E0209 10:27:52.427174 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.527699 kubelet[1443]: E0209 10:27:52.527663 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.628340 kubelet[1443]: E0209 10:27:52.628236 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.728798 kubelet[1443]: E0209 10:27:52.728758 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.829269 kubelet[1443]: E0209 10:27:52.829240 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:52.929897 kubelet[1443]: E0209 10:27:52.929864 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.030393 kubelet[1443]: E0209 10:27:53.030353 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.088336 kubelet[1443]: E0209 10:27:53.088286 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:53.130520 kubelet[1443]: E0209 10:27:53.130469 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.231117 kubelet[1443]: E0209 10:27:53.231030 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.331484 kubelet[1443]: E0209 10:27:53.331454 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.432037 kubelet[1443]: E0209 10:27:53.432004 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.532585 kubelet[1443]: E0209 10:27:53.532515 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.633120 kubelet[1443]: E0209 10:27:53.633091 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.733564 kubelet[1443]: E0209 10:27:53.733540 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.834193 kubelet[1443]: E0209 10:27:53.834123 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:53.934685 kubelet[1443]: E0209 10:27:53.934660 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.035191 kubelet[1443]: E0209 10:27:54.035169 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.089047 kubelet[1443]: E0209 10:27:54.088975 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:54.136147 kubelet[1443]: E0209 10:27:54.136115 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.236772 kubelet[1443]: E0209 10:27:54.236740 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.337242 kubelet[1443]: E0209 10:27:54.337200 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.437825 kubelet[1443]: E0209 10:27:54.437789 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.538346 kubelet[1443]: E0209 10:27:54.538288 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.639106 kubelet[1443]: E0209 10:27:54.639065 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.739749 kubelet[1443]: E0209 10:27:54.739606 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.840172 kubelet[1443]: E0209 10:27:54.840137 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:54.941132 kubelet[1443]: E0209 10:27:54.941109 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.041764 kubelet[1443]: E0209 10:27:55.041687 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.089547 kubelet[1443]: E0209 10:27:55.089524 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:55.141829 kubelet[1443]: E0209 10:27:55.141797 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.242937 kubelet[1443]: E0209 10:27:55.242905 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.343411 kubelet[1443]: E0209 10:27:55.343290 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.443823 kubelet[1443]: E0209 10:27:55.443790 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.544295 kubelet[1443]: E0209 10:27:55.544268 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.644921 kubelet[1443]: E0209 10:27:55.644886 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.745396 kubelet[1443]: E0209 10:27:55.745364 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.845466 kubelet[1443]: E0209 10:27:55.845428 1443 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 10:27:55.947077 kubelet[1443]: I0209 10:27:55.946857 1443 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 10:27:55.947411 env[1142]: time="2024-02-09T10:27:55.947226944Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 10:27:55.947863 kubelet[1443]: I0209 10:27:55.947847 1443 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 10:27:56.075189 kubelet[1443]: E0209 10:27:56.075150 1443 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:56.085584 kubelet[1443]: I0209 10:27:56.085548 1443 apiserver.go:52] "Watching apiserver" Feb 9 10:27:56.088347 kubelet[1443]: I0209 10:27:56.088324 1443 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:56.088419 kubelet[1443]: I0209 10:27:56.088405 1443 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:56.088458 kubelet[1443]: I0209 10:27:56.088438 1443 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:56.088676 kubelet[1443]: E0209 10:27:56.088639 1443 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vrcxw" podUID=82b9abe5-1c35-4a98-b351-a5e69b43486f Feb 9 10:27:56.089855 kubelet[1443]: E0209 10:27:56.089816 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:56.093014 systemd[1]: Created slice kubepods-besteffort-pod38feea26_7288_41c8_b0f9_0ffa96491339.slice. Feb 9 10:27:56.103149 systemd[1]: Created slice kubepods-besteffort-podc5df458e_d699_43f2_acec_05f2457c7163.slice. Feb 9 10:27:56.181035 kubelet[1443]: I0209 10:27:56.180990 1443 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:27:56.274794 kubelet[1443]: I0209 10:27:56.274420 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/38feea26-7288-41c8-b0f9-0ffa96491339-tigera-ca-bundle\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.274944 kubelet[1443]: I0209 10:27:56.274925 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-cni-bin-dir\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275032 kubelet[1443]: I0209 10:27:56.275020 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-flexvol-driver-host\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275110 kubelet[1443]: I0209 10:27:56.275098 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/82b9abe5-1c35-4a98-b351-a5e69b43486f-varrun\") pod \"csi-node-driver-vrcxw\" (UID: \"82b9abe5-1c35-4a98-b351-a5e69b43486f\") " pod="calico-system/csi-node-driver-vrcxw" Feb 9 10:27:56.275190 kubelet[1443]: I0209 10:27:56.275179 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-policysync\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275273 kubelet[1443]: I0209 10:27:56.275262 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/38feea26-7288-41c8-b0f9-0ffa96491339-node-certs\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275387 kubelet[1443]: I0209 10:27:56.275375 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-var-run-calico\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275520 kubelet[1443]: I0209 10:27:56.275474 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-cni-log-dir\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275570 kubelet[1443]: I0209 10:27:56.275527 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2sxzm\" (UniqueName: \"kubernetes.io/projected/38feea26-7288-41c8-b0f9-0ffa96491339-kube-api-access-2sxzm\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275570 kubelet[1443]: I0209 10:27:56.275565 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c5df458e-d699-43f2-acec-05f2457c7163-kube-proxy\") pod \"kube-proxy-z4f8p\" (UID: \"c5df458e-d699-43f2-acec-05f2457c7163\") " pod="kube-system/kube-proxy-z4f8p" Feb 9 10:27:56.275616 kubelet[1443]: I0209 10:27:56.275594 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/82b9abe5-1c35-4a98-b351-a5e69b43486f-kubelet-dir\") pod \"csi-node-driver-vrcxw\" (UID: \"82b9abe5-1c35-4a98-b351-a5e69b43486f\") " pod="calico-system/csi-node-driver-vrcxw" Feb 9 10:27:56.275616 kubelet[1443]: I0209 10:27:56.275616 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/82b9abe5-1c35-4a98-b351-a5e69b43486f-registration-dir\") pod \"csi-node-driver-vrcxw\" (UID: \"82b9abe5-1c35-4a98-b351-a5e69b43486f\") " pod="calico-system/csi-node-driver-vrcxw" Feb 9 10:27:56.275701 kubelet[1443]: I0209 10:27:56.275647 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-lib-modules\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275701 kubelet[1443]: I0209 10:27:56.275667 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-cni-net-dir\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275701 kubelet[1443]: I0209 10:27:56.275689 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c5df458e-d699-43f2-acec-05f2457c7163-xtables-lock\") pod \"kube-proxy-z4f8p\" (UID: \"c5df458e-d699-43f2-acec-05f2457c7163\") " pod="kube-system/kube-proxy-z4f8p" Feb 9 10:27:56.275764 kubelet[1443]: I0209 10:27:56.275721 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h7gfv\" (UniqueName: \"kubernetes.io/projected/82b9abe5-1c35-4a98-b351-a5e69b43486f-kube-api-access-h7gfv\") pod \"csi-node-driver-vrcxw\" (UID: \"82b9abe5-1c35-4a98-b351-a5e69b43486f\") " pod="calico-system/csi-node-driver-vrcxw" Feb 9 10:27:56.275764 kubelet[1443]: I0209 10:27:56.275740 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-var-lib-calico\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275764 kubelet[1443]: I0209 10:27:56.275759 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c5df458e-d699-43f2-acec-05f2457c7163-lib-modules\") pod \"kube-proxy-z4f8p\" (UID: \"c5df458e-d699-43f2-acec-05f2457c7163\") " pod="kube-system/kube-proxy-z4f8p" Feb 9 10:27:56.275830 kubelet[1443]: I0209 10:27:56.275778 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rnqsk\" (UniqueName: \"kubernetes.io/projected/c5df458e-d699-43f2-acec-05f2457c7163-kube-api-access-rnqsk\") pod \"kube-proxy-z4f8p\" (UID: \"c5df458e-d699-43f2-acec-05f2457c7163\") " pod="kube-system/kube-proxy-z4f8p" Feb 9 10:27:56.275830 kubelet[1443]: I0209 10:27:56.275797 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/82b9abe5-1c35-4a98-b351-a5e69b43486f-socket-dir\") pod \"csi-node-driver-vrcxw\" (UID: \"82b9abe5-1c35-4a98-b351-a5e69b43486f\") " pod="calico-system/csi-node-driver-vrcxw" Feb 9 10:27:56.275830 kubelet[1443]: I0209 10:27:56.275816 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/38feea26-7288-41c8-b0f9-0ffa96491339-xtables-lock\") pod \"calico-node-d2x9l\" (UID: \"38feea26-7288-41c8-b0f9-0ffa96491339\") " pod="calico-system/calico-node-d2x9l" Feb 9 10:27:56.275898 kubelet[1443]: I0209 10:27:56.275843 1443 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:27:56.377585 kubelet[1443]: E0209 10:27:56.377563 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.377701 kubelet[1443]: W0209 10:27:56.377685 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.377775 kubelet[1443]: E0209 10:27:56.377764 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.378030 kubelet[1443]: E0209 10:27:56.377995 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.378030 kubelet[1443]: W0209 10:27:56.378012 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.378096 kubelet[1443]: E0209 10:27:56.378034 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.378213 kubelet[1443]: E0209 10:27:56.378201 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.378213 kubelet[1443]: W0209 10:27:56.378213 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.378272 kubelet[1443]: E0209 10:27:56.378229 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.378403 kubelet[1443]: E0209 10:27:56.378383 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.378403 kubelet[1443]: W0209 10:27:56.378395 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.378500 kubelet[1443]: E0209 10:27:56.378410 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.378676 kubelet[1443]: E0209 10:27:56.378649 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.378676 kubelet[1443]: W0209 10:27:56.378662 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.378732 kubelet[1443]: E0209 10:27:56.378713 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.378840 kubelet[1443]: E0209 10:27:56.378828 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.378878 kubelet[1443]: W0209 10:27:56.378840 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.378937 kubelet[1443]: E0209 10:27:56.378922 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.379462 kubelet[1443]: E0209 10:27:56.379448 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.379515 kubelet[1443]: W0209 10:27:56.379462 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.379515 kubelet[1443]: E0209 10:27:56.379506 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.379640 kubelet[1443]: E0209 10:27:56.379630 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.379640 kubelet[1443]: W0209 10:27:56.379640 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.379745 kubelet[1443]: E0209 10:27:56.379719 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.379809 kubelet[1443]: E0209 10:27:56.379783 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.379862 kubelet[1443]: W0209 10:27:56.379850 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.379978 kubelet[1443]: E0209 10:27:56.379954 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.380155 kubelet[1443]: E0209 10:27:56.380141 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.380217 kubelet[1443]: W0209 10:27:56.380206 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.380346 kubelet[1443]: E0209 10:27:56.380327 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.380471 kubelet[1443]: E0209 10:27:56.380450 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.380538 kubelet[1443]: W0209 10:27:56.380525 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.380658 kubelet[1443]: E0209 10:27:56.380636 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.380768 kubelet[1443]: E0209 10:27:56.380755 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.380826 kubelet[1443]: W0209 10:27:56.380815 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.380948 kubelet[1443]: E0209 10:27:56.380925 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.383167 kubelet[1443]: E0209 10:27:56.383091 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.383167 kubelet[1443]: W0209 10:27:56.383108 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.383265 kubelet[1443]: E0209 10:27:56.383237 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.383303 kubelet[1443]: E0209 10:27:56.383274 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.383303 kubelet[1443]: W0209 10:27:56.383284 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.383443 kubelet[1443]: E0209 10:27:56.383327 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.383443 kubelet[1443]: E0209 10:27:56.383423 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.383443 kubelet[1443]: W0209 10:27:56.383432 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.383520 kubelet[1443]: E0209 10:27:56.383485 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.383602 kubelet[1443]: E0209 10:27:56.383561 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.383602 kubelet[1443]: W0209 10:27:56.383576 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.383667 kubelet[1443]: E0209 10:27:56.383609 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.383730 kubelet[1443]: E0209 10:27:56.383716 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.383730 kubelet[1443]: W0209 10:27:56.383726 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.383787 kubelet[1443]: E0209 10:27:56.383749 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.383893 kubelet[1443]: E0209 10:27:56.383881 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.383893 kubelet[1443]: W0209 10:27:56.383890 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.383943 kubelet[1443]: E0209 10:27:56.383908 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.384024 kubelet[1443]: E0209 10:27:56.384013 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.384024 kubelet[1443]: W0209 10:27:56.384021 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.384068 kubelet[1443]: E0209 10:27:56.384040 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.384169 kubelet[1443]: E0209 10:27:56.384159 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.384169 kubelet[1443]: W0209 10:27:56.384168 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.384218 kubelet[1443]: E0209 10:27:56.384187 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.384292 kubelet[1443]: E0209 10:27:56.384282 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.384292 kubelet[1443]: W0209 10:27:56.384291 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.384360 kubelet[1443]: E0209 10:27:56.384348 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.384459 kubelet[1443]: E0209 10:27:56.384446 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.384459 kubelet[1443]: W0209 10:27:56.384458 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.384524 kubelet[1443]: E0209 10:27:56.384485 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.384628 kubelet[1443]: E0209 10:27:56.384614 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.384628 kubelet[1443]: W0209 10:27:56.384626 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.384683 kubelet[1443]: E0209 10:27:56.384642 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.384819 kubelet[1443]: E0209 10:27:56.384806 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.384819 kubelet[1443]: W0209 10:27:56.384818 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.384866 kubelet[1443]: E0209 10:27:56.384839 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.384953 kubelet[1443]: E0209 10:27:56.384942 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.384953 kubelet[1443]: W0209 10:27:56.384952 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.384999 kubelet[1443]: E0209 10:27:56.384972 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.385088 kubelet[1443]: E0209 10:27:56.385078 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.385088 kubelet[1443]: W0209 10:27:56.385087 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.385133 kubelet[1443]: E0209 10:27:56.385105 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.385223 kubelet[1443]: E0209 10:27:56.385213 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.385223 kubelet[1443]: W0209 10:27:56.385222 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.385267 kubelet[1443]: E0209 10:27:56.385240 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.385365 kubelet[1443]: E0209 10:27:56.385355 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.385397 kubelet[1443]: W0209 10:27:56.385365 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.385397 kubelet[1443]: E0209 10:27:56.385385 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.385524 kubelet[1443]: E0209 10:27:56.385511 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.385524 kubelet[1443]: W0209 10:27:56.385521 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.385567 kubelet[1443]: E0209 10:27:56.385535 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.385717 kubelet[1443]: E0209 10:27:56.385705 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.385717 kubelet[1443]: W0209 10:27:56.385715 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.385774 kubelet[1443]: E0209 10:27:56.385729 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.385952 kubelet[1443]: E0209 10:27:56.385938 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.385980 kubelet[1443]: W0209 10:27:56.385951 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.385980 kubelet[1443]: E0209 10:27:56.385967 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.386124 kubelet[1443]: E0209 10:27:56.386112 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.386155 kubelet[1443]: W0209 10:27:56.386124 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.386155 kubelet[1443]: E0209 10:27:56.386138 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.386357 kubelet[1443]: E0209 10:27:56.386308 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.386357 kubelet[1443]: W0209 10:27:56.386357 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.386420 kubelet[1443]: E0209 10:27:56.386371 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.386530 kubelet[1443]: E0209 10:27:56.386517 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.386530 kubelet[1443]: W0209 10:27:56.386527 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.386582 kubelet[1443]: E0209 10:27:56.386537 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.478096 kubelet[1443]: E0209 10:27:56.478052 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.478096 kubelet[1443]: W0209 10:27:56.478070 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.478096 kubelet[1443]: E0209 10:27:56.478088 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.478325 kubelet[1443]: E0209 10:27:56.478288 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.478325 kubelet[1443]: W0209 10:27:56.478299 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.478325 kubelet[1443]: E0209 10:27:56.478322 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.478502 kubelet[1443]: E0209 10:27:56.478482 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.478502 kubelet[1443]: W0209 10:27:56.478496 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.478561 kubelet[1443]: E0209 10:27:56.478508 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.579108 kubelet[1443]: E0209 10:27:56.579007 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.579108 kubelet[1443]: W0209 10:27:56.579027 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.579108 kubelet[1443]: E0209 10:27:56.579044 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.582002 kubelet[1443]: E0209 10:27:56.581939 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.582002 kubelet[1443]: W0209 10:27:56.581957 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.582002 kubelet[1443]: E0209 10:27:56.581973 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.582272 kubelet[1443]: E0209 10:27:56.582196 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.582272 kubelet[1443]: W0209 10:27:56.582209 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.582272 kubelet[1443]: E0209 10:27:56.582220 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.656431 kubelet[1443]: E0209 10:27:56.656393 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.656431 kubelet[1443]: W0209 10:27:56.656414 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.656431 kubelet[1443]: E0209 10:27:56.656434 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.682770 kubelet[1443]: E0209 10:27:56.682738 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.682770 kubelet[1443]: W0209 10:27:56.682756 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.682770 kubelet[1443]: E0209 10:27:56.682771 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.682991 kubelet[1443]: E0209 10:27:56.682964 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.682991 kubelet[1443]: W0209 10:27:56.682975 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.682991 kubelet[1443]: E0209 10:27:56.682985 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.705283 kubelet[1443]: E0209 10:27:56.705248 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:56.706011 env[1142]: time="2024-02-09T10:27:56.705936177Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z4f8p,Uid:c5df458e-d699-43f2-acec-05f2457c7163,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:56.784374 kubelet[1443]: E0209 10:27:56.784347 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.784511 kubelet[1443]: W0209 10:27:56.784495 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.784603 kubelet[1443]: E0209 10:27:56.784590 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.784853 kubelet[1443]: E0209 10:27:56.784839 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.784927 kubelet[1443]: W0209 10:27:56.784915 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.784984 kubelet[1443]: E0209 10:27:56.784975 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.859509 kubelet[1443]: E0209 10:27:56.859279 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.859509 kubelet[1443]: W0209 10:27:56.859300 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.859509 kubelet[1443]: E0209 10:27:56.859330 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.885430 kubelet[1443]: E0209 10:27:56.885409 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.885430 kubelet[1443]: W0209 10:27:56.885426 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.885593 kubelet[1443]: E0209 10:27:56.885441 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:56.986745 kubelet[1443]: E0209 10:27:56.986714 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:56.986745 kubelet[1443]: W0209 10:27:56.986731 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:56.986745 kubelet[1443]: E0209 10:27:56.986746 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:57.002800 kubelet[1443]: E0209 10:27:57.002774 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:57.003157 env[1142]: time="2024-02-09T10:27:57.003114322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d2x9l,Uid:38feea26-7288-41c8-b0f9-0ffa96491339,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:57.055424 kubelet[1443]: E0209 10:27:57.055405 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:57.055515 kubelet[1443]: W0209 10:27:57.055501 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:57.055591 kubelet[1443]: E0209 10:27:57.055579 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:57.090645 kubelet[1443]: E0209 10:27:57.090625 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:57.260901 env[1142]: time="2024-02-09T10:27:57.260849886Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:57.262693 env[1142]: time="2024-02-09T10:27:57.262662524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:57.263899 env[1142]: time="2024-02-09T10:27:57.263870869Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:57.267793 env[1142]: time="2024-02-09T10:27:57.267766509Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:57.269989 env[1142]: time="2024-02-09T10:27:57.269956170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:57.271657 env[1142]: time="2024-02-09T10:27:57.271628768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:57.274165 env[1142]: time="2024-02-09T10:27:57.274135687Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:57.275094 env[1142]: time="2024-02-09T10:27:57.275063673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:57.305288 env[1142]: time="2024-02-09T10:27:57.305213977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:57.305420 env[1142]: time="2024-02-09T10:27:57.305255074Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:57.305420 env[1142]: time="2024-02-09T10:27:57.305265588Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:57.305543 env[1142]: time="2024-02-09T10:27:57.305491977Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1fe700b887df81d8ed3839dd47bed7517444cf459b03b0373e2f68923b8a00ee pid=1592 runtime=io.containerd.runc.v2 Feb 9 10:27:57.305606 env[1142]: time="2024-02-09T10:27:57.305294451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:57.305606 env[1142]: time="2024-02-09T10:27:57.305338386Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:57.305606 env[1142]: time="2024-02-09T10:27:57.305348500Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:57.305767 env[1142]: time="2024-02-09T10:27:57.305723844Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219 pid=1591 runtime=io.containerd.runc.v2 Feb 9 10:27:57.327147 systemd[1]: Started cri-containerd-1fe700b887df81d8ed3839dd47bed7517444cf459b03b0373e2f68923b8a00ee.scope. Feb 9 10:27:57.331403 systemd[1]: Started cri-containerd-9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219.scope. Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.358708 kernel: audit: type=1400 audit(1707474477.353:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.358768 kernel: audit: type=1400 audit(1707474477.353:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.358788 kernel: audit: type=1400 audit(1707474477.353:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.360300 kernel: audit: type=1400 audit(1707474477.353:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.363776 kernel: audit: type=1400 audit(1707474477.353:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.365433 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:27:57.365469 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 10:27:57.365497 kernel: audit: type=1400 audit(1707474477.353:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.365526 kernel: audit: backlog limit exceeded Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.353000 audit: BPF prog-id=61 op=LOAD Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=1592 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653730306238383764663831643865643338333964643437626564 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=1592 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653730306238383764663831643865643338333964643437626564 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.354000 audit: BPF prog-id=62 op=LOAD Feb 9 10:27:57.354000 audit[1612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=1592 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653730306238383764663831643865643338333964643437626564 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368323 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.355000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.355000 audit: BPF prog-id=63 op=LOAD Feb 9 10:27:57.355000 audit[1612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=1592 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653730306238383764663831643865643338333964643437626564 Feb 9 10:27:57.357000 audit: BPF prog-id=63 op=UNLOAD Feb 9 10:27:57.357000 audit: BPF prog-id=62 op=UNLOAD Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.357000 audit: BPF prog-id=64 op=LOAD Feb 9 10:27:57.357000 audit[1612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=1592 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653730306238383764663831643865643338333964643437626564 Feb 9 10:27:57.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.367000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.367000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1591 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626263643938386562313238373464666435326430393161386336 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1591 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626263643938386562313238373464666435326430393161386336 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit: BPF prog-id=66 op=LOAD Feb 9 10:27:57.368000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1591 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626263643938386562313238373464666435326430393161386336 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit: BPF prog-id=67 op=LOAD Feb 9 10:27:57.368000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1591 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626263643938386562313238373464666435326430393161386336 Feb 9 10:27:57.368000 audit: BPF prog-id=67 op=UNLOAD Feb 9 10:27:57.368000 audit: BPF prog-id=66 op=UNLOAD Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:57.368000 audit: BPF prog-id=68 op=LOAD Feb 9 10:27:57.368000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1591 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:57.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626263643938386562313238373464666435326430393161386336 Feb 9 10:27:57.378475 env[1142]: time="2024-02-09T10:27:57.378438954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z4f8p,Uid:c5df458e-d699-43f2-acec-05f2457c7163,Namespace:kube-system,Attempt:0,} returns sandbox id \"1fe700b887df81d8ed3839dd47bed7517444cf459b03b0373e2f68923b8a00ee\"" Feb 9 10:27:57.379285 kubelet[1443]: E0209 10:27:57.379257 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:57.380257 env[1142]: time="2024-02-09T10:27:57.380223487Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 10:27:57.384438 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3664830553.mount: Deactivated successfully. Feb 9 10:27:57.387331 env[1142]: time="2024-02-09T10:27:57.387267517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d2x9l,Uid:38feea26-7288-41c8-b0f9-0ffa96491339,Namespace:calico-system,Attempt:0,} returns sandbox id \"9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219\"" Feb 9 10:27:57.387951 kubelet[1443]: E0209 10:27:57.387919 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:58.091675 kubelet[1443]: E0209 10:27:58.091627 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:58.237946 kubelet[1443]: E0209 10:27:58.237642 1443 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vrcxw" podUID=82b9abe5-1c35-4a98-b351-a5e69b43486f Feb 9 10:27:58.398103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3608262631.mount: Deactivated successfully. Feb 9 10:27:58.737119 env[1142]: time="2024-02-09T10:27:58.737010251Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:58.738425 env[1142]: time="2024-02-09T10:27:58.738396953Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:58.740205 env[1142]: time="2024-02-09T10:27:58.740166703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:58.741689 env[1142]: time="2024-02-09T10:27:58.741661591Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:58.742108 env[1142]: time="2024-02-09T10:27:58.742072984Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 10:27:58.742866 env[1142]: time="2024-02-09T10:27:58.742753042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 10:27:58.744056 env[1142]: time="2024-02-09T10:27:58.744019005Z" level=info msg="CreateContainer within sandbox \"1fe700b887df81d8ed3839dd47bed7517444cf459b03b0373e2f68923b8a00ee\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 10:27:58.756229 env[1142]: time="2024-02-09T10:27:58.756187963Z" level=info msg="CreateContainer within sandbox \"1fe700b887df81d8ed3839dd47bed7517444cf459b03b0373e2f68923b8a00ee\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c6e14e0ea343b9809aa0ebb4d67fc31c0393fcd9339ad74713ce8579853ac2a7\"" Feb 9 10:27:58.756828 env[1142]: time="2024-02-09T10:27:58.756795178Z" level=info msg="StartContainer for \"c6e14e0ea343b9809aa0ebb4d67fc31c0393fcd9339ad74713ce8579853ac2a7\"" Feb 9 10:27:58.773628 systemd[1]: Started cri-containerd-c6e14e0ea343b9809aa0ebb4d67fc31c0393fcd9339ad74713ce8579853ac2a7.scope. Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1592 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653134653065613334336239383039616130656262346436376663 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit: BPF prog-id=69 op=LOAD Feb 9 10:27:58.793000 audit[1665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1592 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653134653065613334336239383039616130656262346436376663 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.793000 audit: BPF prog-id=70 op=LOAD Feb 9 10:27:58.793000 audit[1665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1592 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653134653065613334336239383039616130656262346436376663 Feb 9 10:27:58.794000 audit: BPF prog-id=70 op=UNLOAD Feb 9 10:27:58.794000 audit: BPF prog-id=69 op=UNLOAD Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:58.794000 audit: BPF prog-id=71 op=LOAD Feb 9 10:27:58.794000 audit[1665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1592 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653134653065613334336239383039616130656262346436376663 Feb 9 10:27:58.811207 env[1142]: time="2024-02-09T10:27:58.811084146Z" level=info msg="StartContainer for \"c6e14e0ea343b9809aa0ebb4d67fc31c0393fcd9339ad74713ce8579853ac2a7\" returns successfully" Feb 9 10:27:58.894000 audit[1717]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:58.894000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe46c0460 a2=0 a3=ffff8fdc36c0 items=0 ppid=1677 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:27:58.894000 audit[1718]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:58.894000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe81950e0 a2=0 a3=ffff9ad336c0 items=0 ppid=1677 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:27:58.895000 audit[1720]: NETFILTER_CFG table=nat:37 family=10 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:58.895000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3888ca0 a2=0 a3=ffff8f96d6c0 items=0 ppid=1677 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:27:58.895000 audit[1719]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:58.895000 audit[1719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4873df0 a2=0 a3=ffff974686c0 items=0 ppid=1677 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:27:58.896000 audit[1722]: NETFILTER_CFG table=filter:39 family=10 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:58.896000 audit[1722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff748e760 a2=0 a3=ffffaa7a76c0 items=0 ppid=1677 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:27:58.897000 audit[1723]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:58.897000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6ab2540 a2=0 a3=ffff83e6a6c0 items=0 ppid=1677 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:27:58.996000 audit[1724]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:58.996000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcc39ab20 a2=0 a3=ffffb102c6c0 items=0 ppid=1677 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:27:58.998000 audit[1726]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:58.998000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffee4a3f60 a2=0 a3=ffffa96626c0 items=0 ppid=1677 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:58.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 10:27:59.001000 audit[1729]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.001000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe1335490 a2=0 a3=ffffa5a216c0 items=0 ppid=1677 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 10:27:59.002000 audit[1730]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.002000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe21f08a0 a2=0 a3=ffffa77786c0 items=0 ppid=1677 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:27:59.005000 audit[1732]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.005000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe473ced0 a2=0 a3=ffffa7e036c0 items=0 ppid=1677 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:27:59.006000 audit[1733]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.006000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8f40850 a2=0 a3=ffffabe416c0 items=0 ppid=1677 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:27:59.008000 audit[1735]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.008000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffca09ec80 a2=0 a3=ffffa7d046c0 items=0 ppid=1677 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:27:59.011000 audit[1738]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.011000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeaa60530 a2=0 a3=ffffabaa06c0 items=0 ppid=1677 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 10:27:59.012000 audit[1739]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.012000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd62ba0d0 a2=0 a3=ffff82e2e6c0 items=0 ppid=1677 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:27:59.014000 audit[1741]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.014000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdeb06ca0 a2=0 a3=ffff97a816c0 items=0 ppid=1677 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:27:59.015000 audit[1742]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.015000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff151a670 a2=0 a3=ffffa862e6c0 items=0 ppid=1677 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:27:59.017000 audit[1744]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.017000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff1662950 a2=0 a3=ffffb4e7a6c0 items=0 ppid=1677 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:27:59.020000 audit[1747]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.020000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdb9e9f20 a2=0 a3=ffffac9ce6c0 items=0 ppid=1677 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:27:59.024000 audit[1750]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.024000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe14353a0 a2=0 a3=ffffb0f4a6c0 items=0 ppid=1677 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:27:59.025000 audit[1751]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.025000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffb2650c0 a2=0 a3=ffff9f9e36c0 items=0 ppid=1677 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:27:59.027000 audit[1753]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.027000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdeb914a0 a2=0 a3=ffff9789e6c0 items=0 ppid=1677 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:27:59.030000 audit[1756]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:59.030000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff769a330 a2=0 a3=ffffa56966c0 items=0 ppid=1677 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:27:59.034000 audit[1760]: NETFILTER_CFG table=filter:58 family=2 entries=3 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:59.034000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffdceeda00 a2=0 a3=ffff8d92d6c0 items=0 ppid=1677 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:59.044000 audit[1760]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:59.044000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffdceeda00 a2=0 a3=ffff8d92d6c0 items=0 ppid=1677 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:59.061000 audit[1767]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.061000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd9571620 a2=0 a3=ffff8ca7b6c0 items=0 ppid=1677 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:27:59.063000 audit[1769]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.063000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc584a700 a2=0 a3=ffff870c26c0 items=0 ppid=1677 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 10:27:59.067000 audit[1772]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.067000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff06219d0 a2=0 a3=ffff879846c0 items=0 ppid=1677 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 10:27:59.068000 audit[1773]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.068000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeaa8a610 a2=0 a3=ffff98c356c0 items=0 ppid=1677 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:27:59.070000 audit[1775]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.070000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd97c8450 a2=0 a3=ffff8c3ad6c0 items=0 ppid=1677 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:27:59.071000 audit[1776]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.071000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5feff00 a2=0 a3=ffff944fa6c0 items=0 ppid=1677 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:27:59.073000 audit[1778]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.073000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd4443910 a2=0 a3=ffff956736c0 items=0 ppid=1677 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 10:27:59.076000 audit[1781]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.076000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc0af1960 a2=0 a3=ffffa1a626c0 items=0 ppid=1677 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:27:59.077000 audit[1782]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.077000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd33717c0 a2=0 a3=ffff8b8436c0 items=0 ppid=1677 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:27:59.079000 audit[1784]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.079000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd4fe5050 a2=0 a3=ffff825f66c0 items=0 ppid=1677 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:27:59.080000 audit[1785]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.080000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6636560 a2=0 a3=ffff869ed6c0 items=0 ppid=1677 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:27:59.082000 audit[1787]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.082000 audit[1787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd2e30050 a2=0 a3=ffffac6c56c0 items=0 ppid=1677 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:27:59.085000 audit[1790]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.085000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc7100ae0 a2=0 a3=ffff8f4b66c0 items=0 ppid=1677 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:27:59.088000 audit[1793]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.088000 audit[1793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd2c44910 a2=0 a3=ffffb0de26c0 items=0 ppid=1677 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 10:27:59.089000 audit[1794]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.089000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc959c040 a2=0 a3=ffffba3ed6c0 items=0 ppid=1677 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:27:59.092501 kubelet[1443]: E0209 10:27:59.092450 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:27:59.092000 audit[1796]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.092000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffef3c870 a2=0 a3=ffff9262e6c0 items=0 ppid=1677 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:27:59.095000 audit[1799]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:59.095000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe5b41850 a2=0 a3=ffff85c5d6c0 items=0 ppid=1677 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:27:59.099000 audit[1803]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:27:59.099000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffeeadccc0 a2=0 a3=ffff8c5f26c0 items=0 ppid=1677 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.099000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:59.099000 audit[1803]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:27:59.099000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffeeadccc0 a2=0 a3=ffff8c5f26c0 items=0 ppid=1677 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.099000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:59.273255 kubelet[1443]: E0209 10:27:59.273129 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:59.280511 kubelet[1443]: I0209 10:27:59.280470 1443 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-z4f8p" podStartSLOduration=-9.223372026574339e+09 pod.CreationTimestamp="2024-02-09 10:27:49 +0000 UTC" firstStartedPulling="2024-02-09 10:27:57.379773626 +0000 UTC m=+22.554334275" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:59.279887545 +0000 UTC m=+24.454448194" watchObservedRunningTime="2024-02-09 10:27:59.280437783 +0000 UTC m=+24.454998432" Feb 9 10:27:59.298874 kubelet[1443]: E0209 10:27:59.298848 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.298874 kubelet[1443]: W0209 10:27:59.298865 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.298979 kubelet[1443]: E0209 10:27:59.298883 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.299119 kubelet[1443]: E0209 10:27:59.299093 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.299119 kubelet[1443]: W0209 10:27:59.299104 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.299119 kubelet[1443]: E0209 10:27:59.299115 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.299289 kubelet[1443]: E0209 10:27:59.299271 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.299289 kubelet[1443]: W0209 10:27:59.299283 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.299361 kubelet[1443]: E0209 10:27:59.299293 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.299495 kubelet[1443]: E0209 10:27:59.299474 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.299495 kubelet[1443]: W0209 10:27:59.299486 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.299495 kubelet[1443]: E0209 10:27:59.299496 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.299685 kubelet[1443]: E0209 10:27:59.299670 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.299685 kubelet[1443]: W0209 10:27:59.299680 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.299736 kubelet[1443]: E0209 10:27:59.299691 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.299832 kubelet[1443]: E0209 10:27:59.299822 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.299832 kubelet[1443]: W0209 10:27:59.299831 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.299887 kubelet[1443]: E0209 10:27:59.299846 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.300002 kubelet[1443]: E0209 10:27:59.299991 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.300027 kubelet[1443]: W0209 10:27:59.300001 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.300027 kubelet[1443]: E0209 10:27:59.300011 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.300136 kubelet[1443]: E0209 10:27:59.300127 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.300136 kubelet[1443]: W0209 10:27:59.300135 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.300181 kubelet[1443]: E0209 10:27:59.300144 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.300290 kubelet[1443]: E0209 10:27:59.300281 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.300320 kubelet[1443]: W0209 10:27:59.300290 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.300320 kubelet[1443]: E0209 10:27:59.300302 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.300512 kubelet[1443]: E0209 10:27:59.300499 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.300512 kubelet[1443]: W0209 10:27:59.300511 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.300560 kubelet[1443]: E0209 10:27:59.300521 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.300649 kubelet[1443]: E0209 10:27:59.300640 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.300673 kubelet[1443]: W0209 10:27:59.300649 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.300673 kubelet[1443]: E0209 10:27:59.300659 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.300778 kubelet[1443]: E0209 10:27:59.300769 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.300801 kubelet[1443]: W0209 10:27:59.300778 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.300801 kubelet[1443]: E0209 10:27:59.300787 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.300946 kubelet[1443]: E0209 10:27:59.300937 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.300946 kubelet[1443]: W0209 10:27:59.300946 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.300998 kubelet[1443]: E0209 10:27:59.300955 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.301079 kubelet[1443]: E0209 10:27:59.301070 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.301079 kubelet[1443]: W0209 10:27:59.301078 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.301121 kubelet[1443]: E0209 10:27:59.301088 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.301211 kubelet[1443]: E0209 10:27:59.301203 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.301234 kubelet[1443]: W0209 10:27:59.301211 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.301234 kubelet[1443]: E0209 10:27:59.301220 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.301348 kubelet[1443]: E0209 10:27:59.301339 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.301373 kubelet[1443]: W0209 10:27:59.301348 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.301373 kubelet[1443]: E0209 10:27:59.301357 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.301525 kubelet[1443]: E0209 10:27:59.301515 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.301525 kubelet[1443]: W0209 10:27:59.301524 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.301614 kubelet[1443]: E0209 10:27:59.301534 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.301707 kubelet[1443]: E0209 10:27:59.301696 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.301707 kubelet[1443]: W0209 10:27:59.301706 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.301751 kubelet[1443]: E0209 10:27:59.301721 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.301897 kubelet[1443]: E0209 10:27:59.301886 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.301922 kubelet[1443]: W0209 10:27:59.301896 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.301922 kubelet[1443]: E0209 10:27:59.301914 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.302051 kubelet[1443]: E0209 10:27:59.302042 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.302051 kubelet[1443]: W0209 10:27:59.302050 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.302096 kubelet[1443]: E0209 10:27:59.302063 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.302185 kubelet[1443]: E0209 10:27:59.302175 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.302185 kubelet[1443]: W0209 10:27:59.302184 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.302230 kubelet[1443]: E0209 10:27:59.302197 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.302357 kubelet[1443]: E0209 10:27:59.302348 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.302381 kubelet[1443]: W0209 10:27:59.302357 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.302381 kubelet[1443]: E0209 10:27:59.302372 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.302641 kubelet[1443]: E0209 10:27:59.302623 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.302641 kubelet[1443]: W0209 10:27:59.302640 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.302709 kubelet[1443]: E0209 10:27:59.302664 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.302852 kubelet[1443]: E0209 10:27:59.302832 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.302852 kubelet[1443]: W0209 10:27:59.302849 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.302902 kubelet[1443]: E0209 10:27:59.302864 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.303003 kubelet[1443]: E0209 10:27:59.302993 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.303031 kubelet[1443]: W0209 10:27:59.303003 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.303031 kubelet[1443]: E0209 10:27:59.303017 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.303172 kubelet[1443]: E0209 10:27:59.303162 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.303172 kubelet[1443]: W0209 10:27:59.303172 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.303220 kubelet[1443]: E0209 10:27:59.303186 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.303449 kubelet[1443]: E0209 10:27:59.303427 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.303449 kubelet[1443]: W0209 10:27:59.303443 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.303504 kubelet[1443]: E0209 10:27:59.303461 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.303641 kubelet[1443]: E0209 10:27:59.303631 1443 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:59.303664 kubelet[1443]: W0209 10:27:59.303640 1443 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:59.303664 kubelet[1443]: E0209 10:27:59.303651 1443 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:59.398176 systemd[1]: run-containerd-runc-k8s.io-c6e14e0ea343b9809aa0ebb4d67fc31c0393fcd9339ad74713ce8579853ac2a7-runc.N5duBY.mount: Deactivated successfully. Feb 9 10:27:59.992278 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4162823274.mount: Deactivated successfully. Feb 9 10:28:00.056825 env[1142]: time="2024-02-09T10:28:00.056782169Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:00.058546 env[1142]: time="2024-02-09T10:28:00.058245206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:00.060258 env[1142]: time="2024-02-09T10:28:00.060223924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:00.062365 env[1142]: time="2024-02-09T10:28:00.062330072Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:00.062707 env[1142]: time="2024-02-09T10:28:00.062674460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 10:28:00.064142 env[1142]: time="2024-02-09T10:28:00.064113106Z" level=info msg="CreateContainer within sandbox \"9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 10:28:00.072464 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1096570218.mount: Deactivated successfully. Feb 9 10:28:00.076165 env[1142]: time="2024-02-09T10:28:00.076131557Z" level=info msg="CreateContainer within sandbox \"9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"df4eeb0b0e38fa91e8b9df104834a34df8422603383c02deb3b633c7f47e33c2\"" Feb 9 10:28:00.076731 env[1142]: time="2024-02-09T10:28:00.076656075Z" level=info msg="StartContainer for \"df4eeb0b0e38fa91e8b9df104834a34df8422603383c02deb3b633c7f47e33c2\"" Feb 9 10:28:00.090940 systemd[1]: Started cri-containerd-df4eeb0b0e38fa91e8b9df104834a34df8422603383c02deb3b633c7f47e33c2.scope. Feb 9 10:28:00.092593 kubelet[1443]: E0209 10:28:00.092558 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1591 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:00.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346565623062306533386661393165386239646631303438333461 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.114000 audit: BPF prog-id=72 op=LOAD Feb 9 10:28:00.114000 audit[1841]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1591 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:00.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346565623062306533386661393165386239646631303438333461 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit: BPF prog-id=73 op=LOAD Feb 9 10:28:00.115000 audit[1841]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1591 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:00.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346565623062306533386661393165386239646631303438333461 Feb 9 10:28:00.115000 audit: BPF prog-id=73 op=UNLOAD Feb 9 10:28:00.115000 audit: BPF prog-id=72 op=UNLOAD Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:00.115000 audit: BPF prog-id=74 op=LOAD Feb 9 10:28:00.115000 audit[1841]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1591 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:00.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346565623062306533386661393165386239646631303438333461 Feb 9 10:28:00.133500 env[1142]: time="2024-02-09T10:28:00.133382188Z" level=info msg="StartContainer for \"df4eeb0b0e38fa91e8b9df104834a34df8422603383c02deb3b633c7f47e33c2\" returns successfully" Feb 9 10:28:00.140220 systemd[1]: cri-containerd-df4eeb0b0e38fa91e8b9df104834a34df8422603383c02deb3b633c7f47e33c2.scope: Deactivated successfully. Feb 9 10:28:00.145000 audit: BPF prog-id=74 op=UNLOAD Feb 9 10:28:00.237798 kubelet[1443]: E0209 10:28:00.237759 1443 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vrcxw" podUID=82b9abe5-1c35-4a98-b351-a5e69b43486f Feb 9 10:28:00.259667 env[1142]: time="2024-02-09T10:28:00.259563753Z" level=info msg="shim disconnected" id=df4eeb0b0e38fa91e8b9df104834a34df8422603383c02deb3b633c7f47e33c2 Feb 9 10:28:00.259667 env[1142]: time="2024-02-09T10:28:00.259611414Z" level=warning msg="cleaning up after shim disconnected" id=df4eeb0b0e38fa91e8b9df104834a34df8422603383c02deb3b633c7f47e33c2 namespace=k8s.io Feb 9 10:28:00.259667 env[1142]: time="2024-02-09T10:28:00.259622050Z" level=info msg="cleaning up dead shim" Feb 9 10:28:00.266608 env[1142]: time="2024-02-09T10:28:00.266574253Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:28:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1878 runtime=io.containerd.runc.v2\n" Feb 9 10:28:00.275555 kubelet[1443]: E0209 10:28:00.275254 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:00.275555 kubelet[1443]: E0209 10:28:00.275534 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:00.276032 env[1142]: time="2024-02-09T10:28:00.275993945Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 10:28:01.092713 kubelet[1443]: E0209 10:28:01.092668 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:01.649133 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2034716917.mount: Deactivated successfully. Feb 9 10:28:02.093573 kubelet[1443]: E0209 10:28:02.093470 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:02.237798 kubelet[1443]: E0209 10:28:02.237764 1443 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vrcxw" podUID=82b9abe5-1c35-4a98-b351-a5e69b43486f Feb 9 10:28:03.094151 kubelet[1443]: E0209 10:28:03.094109 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:03.286680 env[1142]: time="2024-02-09T10:28:03.286620057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:03.287986 env[1142]: time="2024-02-09T10:28:03.287937640Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:03.289322 env[1142]: time="2024-02-09T10:28:03.289286022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:03.290515 env[1142]: time="2024-02-09T10:28:03.290479127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:03.291041 env[1142]: time="2024-02-09T10:28:03.291010120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 10:28:03.292775 env[1142]: time="2024-02-09T10:28:03.292744498Z" level=info msg="CreateContainer within sandbox \"9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 10:28:03.300577 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1535890709.mount: Deactivated successfully. Feb 9 10:28:03.304600 env[1142]: time="2024-02-09T10:28:03.304559707Z" level=info msg="CreateContainer within sandbox \"9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"82a8cfa5fcb6b01bbebf0c0defc9691c37be362905b77051234b517397e2ffd5\"" Feb 9 10:28:03.304964 env[1142]: time="2024-02-09T10:28:03.304940102Z" level=info msg="StartContainer for \"82a8cfa5fcb6b01bbebf0c0defc9691c37be362905b77051234b517397e2ffd5\"" Feb 9 10:28:03.321217 systemd[1]: Started cri-containerd-82a8cfa5fcb6b01bbebf0c0defc9691c37be362905b77051234b517397e2ffd5.scope. Feb 9 10:28:03.348373 kernel: kauditd_printk_skb: 327 callbacks suppressed Feb 9 10:28:03.348497 kernel: audit: type=1400 audit(1707474483.342:658): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.348542 kernel: audit: type=1300 audit(1707474483.342:658): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1591 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:03.348583 kernel: audit: type=1327 audit(1707474483.342:658): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613863666135666362366230316262656266306330646566633936 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1591 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:03.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613863666135666362366230316262656266306330646566633936 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.352612 kernel: audit: type=1400 audit(1707474483.342:659): avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.352659 kernel: audit: type=1400 audit(1707474483.342:659): avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.356009 kernel: audit: type=1400 audit(1707474483.342:659): avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.358007 kernel: audit: type=1400 audit(1707474483.342:659): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.360120 kernel: audit: type=1400 audit(1707474483.342:659): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.362580 kernel: audit: type=1400 audit(1707474483.342:659): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.362640 kernel: audit: type=1400 audit(1707474483.342:659): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit: BPF prog-id=75 op=LOAD Feb 9 10:28:03.342000 audit[1904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1591 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:03.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613863666135666362366230316262656266306330646566633936 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.342000 audit: BPF prog-id=76 op=LOAD Feb 9 10:28:03.342000 audit[1904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1591 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:03.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613863666135666362366230316262656266306330646566633936 Feb 9 10:28:03.344000 audit: BPF prog-id=76 op=UNLOAD Feb 9 10:28:03.344000 audit: BPF prog-id=75 op=UNLOAD Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:03.344000 audit: BPF prog-id=77 op=LOAD Feb 9 10:28:03.344000 audit[1904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1591 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:03.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613863666135666362366230316262656266306330646566633936 Feb 9 10:28:03.379819 env[1142]: time="2024-02-09T10:28:03.379776902Z" level=info msg="StartContainer for \"82a8cfa5fcb6b01bbebf0c0defc9691c37be362905b77051234b517397e2ffd5\" returns successfully" Feb 9 10:28:03.863490 systemd[1]: cri-containerd-82a8cfa5fcb6b01bbebf0c0defc9691c37be362905b77051234b517397e2ffd5.scope: Deactivated successfully. Feb 9 10:28:03.867000 audit: BPF prog-id=77 op=UNLOAD Feb 9 10:28:03.872342 kubelet[1443]: I0209 10:28:03.872298 1443 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 10:28:03.880631 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-82a8cfa5fcb6b01bbebf0c0defc9691c37be362905b77051234b517397e2ffd5-rootfs.mount: Deactivated successfully. Feb 9 10:28:04.094707 kubelet[1443]: E0209 10:28:04.094660 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:04.122652 env[1142]: time="2024-02-09T10:28:04.122550768Z" level=info msg="shim disconnected" id=82a8cfa5fcb6b01bbebf0c0defc9691c37be362905b77051234b517397e2ffd5 Feb 9 10:28:04.122652 env[1142]: time="2024-02-09T10:28:04.122598648Z" level=warning msg="cleaning up after shim disconnected" id=82a8cfa5fcb6b01bbebf0c0defc9691c37be362905b77051234b517397e2ffd5 namespace=k8s.io Feb 9 10:28:04.122652 env[1142]: time="2024-02-09T10:28:04.122611287Z" level=info msg="cleaning up dead shim" Feb 9 10:28:04.129058 env[1142]: time="2024-02-09T10:28:04.129026610Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:28:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1952 runtime=io.containerd.runc.v2\n" Feb 9 10:28:04.241186 systemd[1]: Created slice kubepods-besteffort-pod82b9abe5_1c35_4a98_b351_a5e69b43486f.slice. Feb 9 10:28:04.243247 env[1142]: time="2024-02-09T10:28:04.243191066Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vrcxw,Uid:82b9abe5-1c35-4a98-b351-a5e69b43486f,Namespace:calico-system,Attempt:0,}" Feb 9 10:28:04.286294 kubelet[1443]: E0209 10:28:04.286166 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:04.286883 env[1142]: time="2024-02-09T10:28:04.286853657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 10:28:04.313800 env[1142]: time="2024-02-09T10:28:04.313733811Z" level=error msg="Failed to destroy network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:04.314800 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214-shm.mount: Deactivated successfully. Feb 9 10:28:04.315508 env[1142]: time="2024-02-09T10:28:04.315459910Z" level=error msg="encountered an error cleaning up failed sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:04.315596 env[1142]: time="2024-02-09T10:28:04.315514190Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vrcxw,Uid:82b9abe5-1c35-4a98-b351-a5e69b43486f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:04.316049 kubelet[1443]: E0209 10:28:04.315745 1443 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:04.316049 kubelet[1443]: E0209 10:28:04.315804 1443 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vrcxw" Feb 9 10:28:04.316049 kubelet[1443]: E0209 10:28:04.315823 1443 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vrcxw" Feb 9 10:28:04.316194 kubelet[1443]: E0209 10:28:04.315871 1443 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vrcxw_calico-system(82b9abe5-1c35-4a98-b351-a5e69b43486f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vrcxw_calico-system(82b9abe5-1c35-4a98-b351-a5e69b43486f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vrcxw" podUID=82b9abe5-1c35-4a98-b351-a5e69b43486f Feb 9 10:28:05.095393 kubelet[1443]: E0209 10:28:05.095354 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:05.288352 kubelet[1443]: I0209 10:28:05.288259 1443 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:05.289138 env[1142]: time="2024-02-09T10:28:05.289036894Z" level=info msg="StopPodSandbox for \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\"" Feb 9 10:28:05.309424 env[1142]: time="2024-02-09T10:28:05.309355582Z" level=error msg="StopPodSandbox for \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\" failed" error="failed to destroy network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:05.309655 kubelet[1443]: E0209 10:28:05.309617 1443 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:05.309715 kubelet[1443]: E0209 10:28:05.309678 1443 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214} Feb 9 10:28:05.309743 kubelet[1443]: E0209 10:28:05.309720 1443 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"82b9abe5-1c35-4a98-b351-a5e69b43486f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:28:05.309796 kubelet[1443]: E0209 10:28:05.309757 1443 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"82b9abe5-1c35-4a98-b351-a5e69b43486f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vrcxw" podUID=82b9abe5-1c35-4a98-b351-a5e69b43486f Feb 9 10:28:06.072584 kubelet[1443]: I0209 10:28:06.072540 1443 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:28:06.076970 systemd[1]: Created slice kubepods-besteffort-pod3fe5a3fc_ec7f_45af_a230_8342bde6911f.slice. Feb 9 10:28:06.095569 kubelet[1443]: E0209 10:28:06.095529 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:06.239390 kubelet[1443]: I0209 10:28:06.239302 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2dgc\" (UniqueName: \"kubernetes.io/projected/3fe5a3fc-ec7f-45af-a230-8342bde6911f-kube-api-access-k2dgc\") pod \"nginx-deployment-8ffc5cf85-hk2x2\" (UID: \"3fe5a3fc-ec7f-45af-a230-8342bde6911f\") " pod="default/nginx-deployment-8ffc5cf85-hk2x2" Feb 9 10:28:06.379411 env[1142]: time="2024-02-09T10:28:06.379302712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-hk2x2,Uid:3fe5a3fc-ec7f-45af-a230-8342bde6911f,Namespace:default,Attempt:0,}" Feb 9 10:28:06.429630 env[1142]: time="2024-02-09T10:28:06.429566687Z" level=error msg="Failed to destroy network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:06.430939 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd-shm.mount: Deactivated successfully. Feb 9 10:28:06.431775 env[1142]: time="2024-02-09T10:28:06.431739143Z" level=error msg="encountered an error cleaning up failed sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:06.431892 env[1142]: time="2024-02-09T10:28:06.431865502Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-hk2x2,Uid:3fe5a3fc-ec7f-45af-a230-8342bde6911f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:06.432243 kubelet[1443]: E0209 10:28:06.432197 1443 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:06.432327 kubelet[1443]: E0209 10:28:06.432264 1443 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-hk2x2" Feb 9 10:28:06.432327 kubelet[1443]: E0209 10:28:06.432287 1443 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-hk2x2" Feb 9 10:28:06.432394 kubelet[1443]: E0209 10:28:06.432354 1443 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-hk2x2_default(3fe5a3fc-ec7f-45af-a230-8342bde6911f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-hk2x2_default(3fe5a3fc-ec7f-45af-a230-8342bde6911f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-hk2x2" podUID=3fe5a3fc-ec7f-45af-a230-8342bde6911f Feb 9 10:28:07.095712 kubelet[1443]: E0209 10:28:07.095657 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:07.291276 kubelet[1443]: I0209 10:28:07.291251 1443 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:07.291789 env[1142]: time="2024-02-09T10:28:07.291732785Z" level=info msg="StopPodSandbox for \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\"" Feb 9 10:28:07.313487 env[1142]: time="2024-02-09T10:28:07.313431282Z" level=error msg="StopPodSandbox for \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\" failed" error="failed to destroy network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:28:07.313823 kubelet[1443]: E0209 10:28:07.313794 1443 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:07.313896 kubelet[1443]: E0209 10:28:07.313835 1443 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd} Feb 9 10:28:07.313896 kubelet[1443]: E0209 10:28:07.313877 1443 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3fe5a3fc-ec7f-45af-a230-8342bde6911f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:28:07.313975 kubelet[1443]: E0209 10:28:07.313905 1443 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3fe5a3fc-ec7f-45af-a230-8342bde6911f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-hk2x2" podUID=3fe5a3fc-ec7f-45af-a230-8342bde6911f Feb 9 10:28:08.096812 kubelet[1443]: E0209 10:28:08.096755 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:08.884775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3972587083.mount: Deactivated successfully. Feb 9 10:28:09.097540 kubelet[1443]: E0209 10:28:09.097481 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:09.207176 env[1142]: time="2024-02-09T10:28:09.207077426Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:09.208711 env[1142]: time="2024-02-09T10:28:09.208676252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:09.210883 env[1142]: time="2024-02-09T10:28:09.210709313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:09.212355 env[1142]: time="2024-02-09T10:28:09.212297378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:09.215216 env[1142]: time="2024-02-09T10:28:09.215179872Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 10:28:09.222582 env[1142]: time="2024-02-09T10:28:09.222542564Z" level=info msg="CreateContainer within sandbox \"9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 10:28:09.236609 env[1142]: time="2024-02-09T10:28:09.236566755Z" level=info msg="CreateContainer within sandbox \"9bbbcd988eb12874dfd52d091a8c6772e1c2b97c3297bdd042200db581806219\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"34dd06849347f63b84e7631d7b4e537583643ea268380b8051a0867e8c5e822d\"" Feb 9 10:28:09.236992 env[1142]: time="2024-02-09T10:28:09.236950631Z" level=info msg="StartContainer for \"34dd06849347f63b84e7631d7b4e537583643ea268380b8051a0867e8c5e822d\"" Feb 9 10:28:09.251167 systemd[1]: Started cri-containerd-34dd06849347f63b84e7631d7b4e537583643ea268380b8051a0867e8c5e822d.scope. Feb 9 10:28:09.281083 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 10:28:09.281197 kernel: audit: type=1400 audit(1707474489.274:665): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.281243 kernel: audit: type=1300 audit(1707474489.274:665): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1591 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:09.281266 kernel: audit: type=1327 audit(1707474489.274:665): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646430363834393334376636336238346537363331643762346535 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1591 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:09.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646430363834393334376636336238346537363331643762346535 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.285072 kernel: audit: type=1400 audit(1707474489.274:666): avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.285135 kernel: audit: type=1400 audit(1707474489.274:666): avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.288437 kernel: audit: type=1400 audit(1707474489.274:666): avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.288479 kernel: audit: type=1400 audit(1707474489.274:666): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.290098 kernel: audit: type=1400 audit(1707474489.274:666): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.291816 kernel: audit: type=1400 audit(1707474489.274:666): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.293492 kernel: audit: type=1400 audit(1707474489.274:666): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.274000 audit: BPF prog-id=78 op=LOAD Feb 9 10:28:09.274000 audit[2098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1591 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:09.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646430363834393334376636336238346537363331643762346535 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.275000 audit: BPF prog-id=79 op=LOAD Feb 9 10:28:09.275000 audit[2098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1591 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:09.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646430363834393334376636336238346537363331643762346535 Feb 9 10:28:09.277000 audit: BPF prog-id=79 op=UNLOAD Feb 9 10:28:09.277000 audit: BPF prog-id=78 op=UNLOAD Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:09.277000 audit: BPF prog-id=80 op=LOAD Feb 9 10:28:09.277000 audit[2098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1591 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:09.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646430363834393334376636336238346537363331643762346535 Feb 9 10:28:09.299336 env[1142]: time="2024-02-09T10:28:09.299277457Z" level=info msg="StartContainer for \"34dd06849347f63b84e7631d7b4e537583643ea268380b8051a0867e8c5e822d\" returns successfully" Feb 9 10:28:09.414645 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 10:28:09.414788 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 10:28:10.098292 kubelet[1443]: E0209 10:28:10.098255 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:10.302046 kubelet[1443]: E0209 10:28:10.301804 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:10.315176 kubelet[1443]: I0209 10:28:10.315151 1443 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-d2x9l" podStartSLOduration=-9.223372015539658e+09 pod.CreationTimestamp="2024-02-09 10:27:49 +0000 UTC" firstStartedPulling="2024-02-09 10:27:57.388332705 +0000 UTC m=+22.562893314" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:28:10.314645902 +0000 UTC m=+35.489206631" watchObservedRunningTime="2024-02-09 10:28:10.315118298 +0000 UTC m=+35.489678947" Feb 9 10:28:10.634000 audit[2216]: AVC avc: denied { write } for pid=2216 comm="tee" name="fd" dev="proc" ino=14019 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:28:10.634000 audit[2216]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff112b98c a2=241 a3=1b6 items=1 ppid=2172 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.634000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 10:28:10.634000 audit: PATH item=0 name="/dev/fd/63" inode=14896 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:10.634000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:28:10.638000 audit[2228]: AVC avc: denied { write } for pid=2228 comm="tee" name="fd" dev="proc" ino=14902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:28:10.638000 audit[2228]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec7ed97c a2=241 a3=1b6 items=1 ppid=2167 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.638000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 10:28:10.638000 audit: PATH item=0 name="/dev/fd/63" inode=14899 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:10.638000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:28:10.640000 audit[2231]: AVC avc: denied { write } for pid=2231 comm="tee" name="fd" dev="proc" ino=13102 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:28:10.640000 audit[2227]: AVC avc: denied { write } for pid=2227 comm="tee" name="fd" dev="proc" ino=15409 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:28:10.640000 audit[2227]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff375398e a2=241 a3=1b6 items=1 ppid=2173 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.640000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 10:28:10.640000 audit: PATH item=0 name="/dev/fd/63" inode=13095 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:10.640000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:28:10.641000 audit[2220]: AVC avc: denied { write } for pid=2220 comm="tee" name="fd" dev="proc" ino=14023 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:28:10.641000 audit[2220]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff34af98c a2=241 a3=1b6 items=1 ppid=2174 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.641000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 10:28:10.641000 audit: PATH item=0 name="/dev/fd/63" inode=14013 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:10.641000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:28:10.642000 audit[2223]: AVC avc: denied { write } for pid=2223 comm="tee" name="fd" dev="proc" ino=14027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:28:10.642000 audit[2223]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd9de498d a2=241 a3=1b6 items=1 ppid=2166 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.642000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 10:28:10.642000 audit: PATH item=0 name="/dev/fd/63" inode=14016 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:10.642000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:28:10.640000 audit[2231]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe4a2597d a2=241 a3=1b6 items=1 ppid=2180 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.640000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 10:28:10.640000 audit: PATH item=0 name="/dev/fd/63" inode=13096 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:10.640000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:28:10.644000 audit[2236]: AVC avc: denied { write } for pid=2236 comm="tee" name="fd" dev="proc" ino=13106 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:28:10.644000 audit[2236]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff4a3698c a2=241 a3=1b6 items=1 ppid=2170 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.644000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 10:28:10.644000 audit: PATH item=0 name="/dev/fd/63" inode=13099 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:10.644000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:28:10.753345 kernel: Initializing XFRM netlink socket Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit: BPF prog-id=81 op=LOAD Feb 9 10:28:10.843000 audit[2318]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc679c768 a2=70 a3=0 items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.843000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:28:10.843000 audit: BPF prog-id=81 op=UNLOAD Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit: BPF prog-id=82 op=LOAD Feb 9 10:28:10.843000 audit[2318]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc679c768 a2=70 a3=4a174c items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.843000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:28:10.843000 audit: BPF prog-id=82 op=UNLOAD Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffc679c798 a2=70 a3=d17d79f items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.843000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.843000 audit: BPF prog-id=83 op=LOAD Feb 9 10:28:10.843000 audit[2318]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc679c6e8 a2=70 a3=d17d7b9 items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.843000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:28:10.848000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.848000 audit[2320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffaa9c1b8 a2=70 a3=0 items=0 ppid=2171 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.848000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:28:10.850000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:10.850000 audit[2320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffaa9c098 a2=70 a3=2 items=0 ppid=2171 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.850000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:28:10.860000 audit: BPF prog-id=83 op=UNLOAD Feb 9 10:28:10.901000 audit[2347]: NETFILTER_CFG table=mangle:79 family=2 entries=19 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:10.901000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=fffff7674f50 a2=0 a3=ffff89864fa8 items=0 ppid=2171 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.901000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:10.901000 audit[2345]: NETFILTER_CFG table=raw:80 family=2 entries=19 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:10.901000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffffd281f60 a2=0 a3=ffffba5a5fa8 items=0 ppid=2171 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.901000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:10.903000 audit[2346]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:10.903000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffff0d728d0 a2=0 a3=ffffb458afa8 items=0 ppid=2171 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.903000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:10.907000 audit[2351]: NETFILTER_CFG table=filter:82 family=2 entries=39 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:10.907000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffff227cd50 a2=0 a3=ffff923c0fa8 items=0 ppid=2171 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:10.907000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:11.098600 kubelet[1443]: E0209 10:28:11.098562 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:11.303361 kubelet[1443]: I0209 10:28:11.302568 1443 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:28:11.303361 kubelet[1443]: E0209 10:28:11.303275 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:11.762795 systemd-networkd[1043]: vxlan.calico: Link UP Feb 9 10:28:11.762802 systemd-networkd[1043]: vxlan.calico: Gained carrier Feb 9 10:28:12.099326 kubelet[1443]: E0209 10:28:12.099223 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:13.100220 kubelet[1443]: E0209 10:28:13.100170 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:13.129536 systemd-networkd[1043]: vxlan.calico: Gained IPv6LL Feb 9 10:28:14.019372 update_engine[1135]: I0209 10:28:14.019299 1135 update_attempter.cc:509] Updating boot flags... Feb 9 10:28:14.103639 kubelet[1443]: E0209 10:28:14.103593 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:15.104295 kubelet[1443]: E0209 10:28:15.104250 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:16.075286 kubelet[1443]: E0209 10:28:16.075235 1443 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:16.104821 kubelet[1443]: E0209 10:28:16.104786 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:16.237674 env[1142]: time="2024-02-09T10:28:16.237508355Z" level=info msg="StopPodSandbox for \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\"" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.280 [INFO][2394] k8s.go 578: Cleaning up netns ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.280 [INFO][2394] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" iface="eth0" netns="/var/run/netns/cni-bffef4a5-d54c-1f3e-af71-5ae54fe16db7" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.280 [INFO][2394] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" iface="eth0" netns="/var/run/netns/cni-bffef4a5-d54c-1f3e-af71-5ae54fe16db7" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.280 [INFO][2394] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" iface="eth0" netns="/var/run/netns/cni-bffef4a5-d54c-1f3e-af71-5ae54fe16db7" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.281 [INFO][2394] k8s.go 585: Releasing IP address(es) ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.281 [INFO][2394] utils.go 188: Calico CNI releasing IP address ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.330 [INFO][2402] ipam_plugin.go 415: Releasing address using handleID ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.331 [INFO][2402] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.331 [INFO][2402] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.341 [WARNING][2402] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.341 [INFO][2402] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.342 [INFO][2402] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:16.345623 env[1142]: 2024-02-09 10:28:16.343 [INFO][2394] k8s.go 591: Teardown processing complete. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:16.345623 env[1142]: time="2024-02-09T10:28:16.345123381Z" level=info msg="TearDown network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\" successfully" Feb 9 10:28:16.345623 env[1142]: time="2024-02-09T10:28:16.345152141Z" level=info msg="StopPodSandbox for \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\" returns successfully" Feb 9 10:28:16.346389 systemd[1]: run-netns-cni\x2dbffef4a5\x2dd54c\x2d1f3e\x2daf71\x2d5ae54fe16db7.mount: Deactivated successfully. Feb 9 10:28:16.347013 env[1142]: time="2024-02-09T10:28:16.346984529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vrcxw,Uid:82b9abe5-1c35-4a98-b351-a5e69b43486f,Namespace:calico-system,Attempt:1,}" Feb 9 10:28:16.459040 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:28:16.459146 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ef154ddc52: link becomes ready Feb 9 10:28:16.458660 systemd-networkd[1043]: cali5ef154ddc52: Link UP Feb 9 10:28:16.459205 systemd-networkd[1043]: cali5ef154ddc52: Gained carrier Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.387 [INFO][2410] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-csi--node--driver--vrcxw-eth0 csi-node-driver- calico-system 82b9abe5-1c35-4a98-b351-a5e69b43486f 930 0 2024-02-09 10:27:49 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.4 csi-node-driver-vrcxw eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali5ef154ddc52 [] []}} ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Namespace="calico-system" Pod="csi-node-driver-vrcxw" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--vrcxw-" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.387 [INFO][2410] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Namespace="calico-system" Pod="csi-node-driver-vrcxw" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.411 [INFO][2424] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" HandleID="k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.426 [INFO][2424] ipam_plugin.go 268: Auto assigning IP ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" HandleID="k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029ce20), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.4", "pod":"csi-node-driver-vrcxw", "timestamp":"2024-02-09 10:28:16.411295755 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.427 [INFO][2424] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.427 [INFO][2424] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.427 [INFO][2424] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.429 [INFO][2424] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.435 [INFO][2424] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.442 [INFO][2424] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.443 [INFO][2424] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.445 [INFO][2424] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.445 [INFO][2424] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.447 [INFO][2424] ipam.go 1682: Creating new handle: k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55 Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.450 [INFO][2424] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.454 [INFO][2424] ipam.go 1216: Successfully claimed IPs: [192.168.99.193/26] block=192.168.99.192/26 handle="k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.454 [INFO][2424] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.193/26] handle="k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" host="10.0.0.4" Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.454 [INFO][2424] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:16.472496 env[1142]: 2024-02-09 10:28:16.454 [INFO][2424] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.193/26] IPv6=[] ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" HandleID="k8s-pod-network.115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.473075 env[1142]: 2024-02-09 10:28:16.456 [INFO][2410] k8s.go 385: Populated endpoint ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Namespace="calico-system" Pod="csi-node-driver-vrcxw" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-csi--node--driver--vrcxw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"82b9abe5-1c35-4a98-b351-a5e69b43486f", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"csi-node-driver-vrcxw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5ef154ddc52", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:16.473075 env[1142]: 2024-02-09 10:28:16.456 [INFO][2410] k8s.go 386: Calico CNI using IPs: [192.168.99.193/32] ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Namespace="calico-system" Pod="csi-node-driver-vrcxw" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.473075 env[1142]: 2024-02-09 10:28:16.456 [INFO][2410] dataplane_linux.go 68: Setting the host side veth name to cali5ef154ddc52 ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Namespace="calico-system" Pod="csi-node-driver-vrcxw" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.473075 env[1142]: 2024-02-09 10:28:16.459 [INFO][2410] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Namespace="calico-system" Pod="csi-node-driver-vrcxw" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.473075 env[1142]: 2024-02-09 10:28:16.459 [INFO][2410] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Namespace="calico-system" Pod="csi-node-driver-vrcxw" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-csi--node--driver--vrcxw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"82b9abe5-1c35-4a98-b351-a5e69b43486f", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55", Pod:"csi-node-driver-vrcxw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5ef154ddc52", MAC:"0a:5c:10:5a:99:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:16.473075 env[1142]: 2024-02-09 10:28:16.470 [INFO][2410] k8s.go 491: Wrote updated endpoint to datastore ContainerID="115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55" Namespace="calico-system" Pod="csi-node-driver-vrcxw" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:16.485188 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 9 10:28:16.485281 kernel: audit: type=1325 audit(1707474496.477:691): table=filter:83 family=2 entries=36 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:16.485306 kernel: audit: type=1300 audit(1707474496.477:691): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffc5785900 a2=0 a3=ffffbc838fa8 items=0 ppid=2171 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.485351 kernel: audit: type=1327 audit(1707474496.477:691): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:16.477000 audit[2447]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:16.477000 audit[2447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffc5785900 a2=0 a3=ffffbc838fa8 items=0 ppid=2171 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.477000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:16.485575 env[1142]: time="2024-02-09T10:28:16.481540342Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:28:16.485575 env[1142]: time="2024-02-09T10:28:16.481576822Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:28:16.485575 env[1142]: time="2024-02-09T10:28:16.481586782Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:28:16.485575 env[1142]: time="2024-02-09T10:28:16.481694621Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55 pid=2456 runtime=io.containerd.runc.v2 Feb 9 10:28:16.496256 systemd[1]: Started cri-containerd-115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55.scope. Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.517910 kernel: audit: type=1400 audit(1707474496.513:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.517982 kernel: audit: type=1400 audit(1707474496.513:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518025 kernel: audit: type=1400 audit(1707474496.513:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.521396 kernel: audit: type=1400 audit(1707474496.513:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.521443 kernel: audit: type=1400 audit(1707474496.513:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.524928 kernel: audit: type=1400 audit(1707474496.513:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.524978 kernel: audit: type=1400 audit(1707474496.513:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.514000 audit: BPF prog-id=84 op=LOAD Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356130373865353238653235373966633131313061386330376135 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356130373865353238653235373966633131313061386330376135 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.515000 audit: BPF prog-id=85 op=LOAD Feb 9 10:28:16.515000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356130373865353238653235373966633131313061386330376135 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.516000 audit: BPF prog-id=86 op=LOAD Feb 9 10:28:16.516000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356130373865353238653235373966633131313061386330376135 Feb 9 10:28:16.518000 audit: BPF prog-id=86 op=UNLOAD Feb 9 10:28:16.518000 audit: BPF prog-id=85 op=UNLOAD Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:16.518000 audit: BPF prog-id=87 op=LOAD Feb 9 10:28:16.518000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356130373865353238653235373966633131313061386330376135 Feb 9 10:28:16.526892 systemd-resolved[1092]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:28:16.537557 env[1142]: time="2024-02-09T10:28:16.537518421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vrcxw,Uid:82b9abe5-1c35-4a98-b351-a5e69b43486f,Namespace:calico-system,Attempt:1,} returns sandbox id \"115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55\"" Feb 9 10:28:16.538980 env[1142]: time="2024-02-09T10:28:16.538951212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 10:28:16.745928 kubelet[1443]: I0209 10:28:16.745883 1443 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:28:16.746931 kubelet[1443]: E0209 10:28:16.746891 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:17.105202 kubelet[1443]: E0209 10:28:17.105108 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:17.312721 kubelet[1443]: E0209 10:28:17.312693 1443 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:17.736936 env[1142]: time="2024-02-09T10:28:17.736883751Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:17.738296 env[1142]: time="2024-02-09T10:28:17.738260262Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:17.739670 env[1142]: time="2024-02-09T10:28:17.739644854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:17.741245 env[1142]: time="2024-02-09T10:28:17.741214884Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:17.741648 env[1142]: time="2024-02-09T10:28:17.741618401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 10:28:17.743512 env[1142]: time="2024-02-09T10:28:17.743483270Z" level=info msg="CreateContainer within sandbox \"115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 10:28:17.753655 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3190118206.mount: Deactivated successfully. Feb 9 10:28:17.757032 env[1142]: time="2024-02-09T10:28:17.756994067Z" level=info msg="CreateContainer within sandbox \"115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f85a1e60023df613d401049d1223c9e79a9501e1150192c30efc4bab6983afd1\"" Feb 9 10:28:17.757562 env[1142]: time="2024-02-09T10:28:17.757512664Z" level=info msg="StartContainer for \"f85a1e60023df613d401049d1223c9e79a9501e1150192c30efc4bab6983afd1\"" Feb 9 10:28:17.774851 systemd[1]: Started cri-containerd-f85a1e60023df613d401049d1223c9e79a9501e1150192c30efc4bab6983afd1.scope. Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2456 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:17.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356131653630303233646636313364343031303439643132323363 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit: BPF prog-id=88 op=LOAD Feb 9 10:28:17.800000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2456 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:17.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356131653630303233646636313364343031303439643132323363 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.800000 audit: BPF prog-id=89 op=LOAD Feb 9 10:28:17.800000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2456 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:17.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356131653630303233646636313364343031303439643132323363 Feb 9 10:28:17.801000 audit: BPF prog-id=89 op=UNLOAD Feb 9 10:28:17.801000 audit: BPF prog-id=88 op=UNLOAD Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:17.801000 audit: BPF prog-id=90 op=LOAD Feb 9 10:28:17.801000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2456 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:17.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356131653630303233646636313364343031303439643132323363 Feb 9 10:28:17.814997 env[1142]: time="2024-02-09T10:28:17.814959271Z" level=info msg="StartContainer for \"f85a1e60023df613d401049d1223c9e79a9501e1150192c30efc4bab6983afd1\" returns successfully" Feb 9 10:28:17.816106 env[1142]: time="2024-02-09T10:28:17.816081184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 10:28:17.865526 systemd-networkd[1043]: cali5ef154ddc52: Gained IPv6LL Feb 9 10:28:18.105403 kubelet[1443]: E0209 10:28:18.105308 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:18.961570 env[1142]: time="2024-02-09T10:28:18.961522219Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:18.962993 env[1142]: time="2024-02-09T10:28:18.962954051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:18.964542 env[1142]: time="2024-02-09T10:28:18.964513842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:18.969901 env[1142]: time="2024-02-09T10:28:18.969864810Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:18.970806 env[1142]: time="2024-02-09T10:28:18.970769725Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 10:28:18.972350 env[1142]: time="2024-02-09T10:28:18.972307156Z" level=info msg="CreateContainer within sandbox \"115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 10:28:18.983832 env[1142]: time="2024-02-09T10:28:18.983786609Z" level=info msg="CreateContainer within sandbox \"115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"45b8b64254017a9b5b72b489f42f46b561cb2bc23182bd5d02980c144131b719\"" Feb 9 10:28:18.984260 env[1142]: time="2024-02-09T10:28:18.984232166Z" level=info msg="StartContainer for \"45b8b64254017a9b5b72b489f42f46b561cb2bc23182bd5d02980c144131b719\"" Feb 9 10:28:18.998577 systemd[1]: Started cri-containerd-45b8b64254017a9b5b72b489f42f46b561cb2bc23182bd5d02980c144131b719.scope. Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2456 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:19.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623862363432353430313761396235623732623438396634326634 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.021000 audit: BPF prog-id=91 op=LOAD Feb 9 10:28:19.021000 audit[2580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2456 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:19.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623862363432353430313761396235623732623438396634326634 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.022000 audit: BPF prog-id=92 op=LOAD Feb 9 10:28:19.022000 audit[2580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2456 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:19.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623862363432353430313761396235623732623438396634326634 Feb 9 10:28:19.023000 audit: BPF prog-id=92 op=UNLOAD Feb 9 10:28:19.023000 audit: BPF prog-id=91 op=UNLOAD Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:19.023000 audit: BPF prog-id=93 op=LOAD Feb 9 10:28:19.023000 audit[2580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2456 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:19.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623862363432353430313761396235623732623438396634326634 Feb 9 10:28:19.042603 env[1142]: time="2024-02-09T10:28:19.042563715Z" level=info msg="StartContainer for \"45b8b64254017a9b5b72b489f42f46b561cb2bc23182bd5d02980c144131b719\" returns successfully" Feb 9 10:28:19.105843 kubelet[1443]: E0209 10:28:19.105798 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:19.152328 kubelet[1443]: I0209 10:28:19.152278 1443 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 10:28:19.152328 kubelet[1443]: I0209 10:28:19.152328 1443 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 10:28:20.106585 kubelet[1443]: E0209 10:28:20.106546 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:21.107266 kubelet[1443]: E0209 10:28:21.107236 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:22.108355 kubelet[1443]: E0209 10:28:22.108308 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:22.124799 kubelet[1443]: I0209 10:28:22.124761 1443 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-vrcxw" podStartSLOduration=-9.22337200373005e+09 pod.CreationTimestamp="2024-02-09 10:27:49 +0000 UTC" firstStartedPulling="2024-02-09 10:28:16.538691413 +0000 UTC m=+41.713252062" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:28:19.326727966 +0000 UTC m=+44.501288615" watchObservedRunningTime="2024-02-09 10:28:22.124726176 +0000 UTC m=+47.299286825" Feb 9 10:28:22.125102 kubelet[1443]: I0209 10:28:22.125080 1443 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:28:22.129640 systemd[1]: Created slice kubepods-besteffort-pod10952aee_3ed2_4687_adad_835b7c00eb9e.slice. Feb 9 10:28:22.147000 audit[2644]: NETFILTER_CFG table=filter:84 family=2 entries=7 op=nft_register_rule pid=2644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.150322 kernel: kauditd_printk_skb: 136 callbacks suppressed Feb 9 10:28:22.150391 kernel: audit: type=1325 audit(1707474502.147:722): table=filter:84 family=2 entries=7 op=nft_register_rule pid=2644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.150422 kernel: audit: type=1300 audit(1707474502.147:722): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd1aa0740 a2=0 a3=ffff8234d6c0 items=0 ppid=1677 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.147000 audit[2644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd1aa0740 a2=0 a3=ffff8234d6c0 items=0 ppid=1677 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.154399 kernel: audit: type=1327 audit(1707474502.147:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.149000 audit[2644]: NETFILTER_CFG table=nat:85 family=2 entries=78 op=nft_register_rule pid=2644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.149000 audit[2644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd1aa0740 a2=0 a3=ffff8234d6c0 items=0 ppid=1677 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.160699 kernel: audit: type=1325 audit(1707474502.149:723): table=nat:85 family=2 entries=78 op=nft_register_rule pid=2644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.160763 kernel: audit: type=1300 audit(1707474502.149:723): arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd1aa0740 a2=0 a3=ffff8234d6c0 items=0 ppid=1677 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.160785 kernel: audit: type=1327 audit(1707474502.149:723): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.186000 audit[2673]: NETFILTER_CFG table=filter:86 family=2 entries=8 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.186000 audit[2673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffdd4ef8f0 a2=0 a3=ffff9704f6c0 items=0 ppid=1677 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.192165 kernel: audit: type=1325 audit(1707474502.186:724): table=filter:86 family=2 entries=8 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.192221 kernel: audit: type=1300 audit(1707474502.186:724): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffdd4ef8f0 a2=0 a3=ffff9704f6c0 items=0 ppid=1677 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.192243 kernel: audit: type=1327 audit(1707474502.186:724): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.186000 audit[2673]: NETFILTER_CFG table=nat:87 family=2 entries=78 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.186000 audit[2673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffdd4ef8f0 a2=0 a3=ffff9704f6c0 items=0 ppid=1677 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.202333 kernel: audit: type=1325 audit(1707474502.186:725): table=nat:87 family=2 entries=78 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.219731 kubelet[1443]: I0209 10:28:22.219696 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/10952aee-3ed2-4687-adad-835b7c00eb9e-calico-apiserver-certs\") pod \"calico-apiserver-5898c4df76-lzzr4\" (UID: \"10952aee-3ed2-4687-adad-835b7c00eb9e\") " pod="calico-apiserver/calico-apiserver-5898c4df76-lzzr4" Feb 9 10:28:22.219850 kubelet[1443]: I0209 10:28:22.219800 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kkkq6\" (UniqueName: \"kubernetes.io/projected/10952aee-3ed2-4687-adad-835b7c00eb9e-kube-api-access-kkkq6\") pod \"calico-apiserver-5898c4df76-lzzr4\" (UID: \"10952aee-3ed2-4687-adad-835b7c00eb9e\") " pod="calico-apiserver/calico-apiserver-5898c4df76-lzzr4" Feb 9 10:28:22.238219 env[1142]: time="2024-02-09T10:28:22.238184301Z" level=info msg="StopPodSandbox for \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\"" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.277 [INFO][2691] k8s.go 578: Cleaning up netns ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.278 [INFO][2691] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" iface="eth0" netns="/var/run/netns/cni-492c2c04-1a05-a163-9a9c-6788b4bd6cb0" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.278 [INFO][2691] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" iface="eth0" netns="/var/run/netns/cni-492c2c04-1a05-a163-9a9c-6788b4bd6cb0" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.278 [INFO][2691] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" iface="eth0" netns="/var/run/netns/cni-492c2c04-1a05-a163-9a9c-6788b4bd6cb0" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.278 [INFO][2691] k8s.go 585: Releasing IP address(es) ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.278 [INFO][2691] utils.go 188: Calico CNI releasing IP address ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.295 [INFO][2698] ipam_plugin.go 415: Releasing address using handleID ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.295 [INFO][2698] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.295 [INFO][2698] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.308 [WARNING][2698] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.308 [INFO][2698] ipam_plugin.go 443: Releasing address using workloadID ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.310 [INFO][2698] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:22.312288 env[1142]: 2024-02-09 10:28:22.311 [INFO][2691] k8s.go 591: Teardown processing complete. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:22.313803 systemd[1]: run-netns-cni\x2d492c2c04\x2d1a05\x2da163\x2d9a9c\x2d6788b4bd6cb0.mount: Deactivated successfully. Feb 9 10:28:22.314352 env[1142]: time="2024-02-09T10:28:22.314299089Z" level=info msg="TearDown network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\" successfully" Feb 9 10:28:22.314398 env[1142]: time="2024-02-09T10:28:22.314353489Z" level=info msg="StopPodSandbox for \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\" returns successfully" Feb 9 10:28:22.315016 env[1142]: time="2024-02-09T10:28:22.314979086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-hk2x2,Uid:3fe5a3fc-ec7f-45af-a230-8342bde6911f,Namespace:default,Attempt:1,}" Feb 9 10:28:22.427247 systemd-networkd[1043]: cali2e67282c91e: Link UP Feb 9 10:28:22.428514 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:28:22.428631 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2e67282c91e: link becomes ready Feb 9 10:28:22.428746 systemd-networkd[1043]: cali2e67282c91e: Gained carrier Feb 9 10:28:22.432674 env[1142]: time="2024-02-09T10:28:22.432293312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5898c4df76-lzzr4,Uid:10952aee-3ed2-4687-adad-835b7c00eb9e,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.365 [INFO][2710] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0 nginx-deployment-8ffc5cf85- default 3fe5a3fc-ec7f-45af-a230-8342bde6911f 1010 0 2024-02-09 10:28:06 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.4 nginx-deployment-8ffc5cf85-hk2x2 eth0 default [] [] [kns.default ksa.default.default] cali2e67282c91e [] []}} ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hk2x2" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.366 [INFO][2710] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hk2x2" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.388 [INFO][2722] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" HandleID="k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.400 [INFO][2722] ipam_plugin.go 268: Auto assigning IP ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" HandleID="k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002635c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"nginx-deployment-8ffc5cf85-hk2x2", "timestamp":"2024-02-09 10:28:22.388119848 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.400 [INFO][2722] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.400 [INFO][2722] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.401 [INFO][2722] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.402 [INFO][2722] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.406 [INFO][2722] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.410 [INFO][2722] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.412 [INFO][2722] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.414 [INFO][2722] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.414 [INFO][2722] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.415 [INFO][2722] ipam.go 1682: Creating new handle: k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9 Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.419 [INFO][2722] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.423 [INFO][2722] ipam.go 1216: Successfully claimed IPs: [192.168.99.194/26] block=192.168.99.192/26 handle="k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.423 [INFO][2722] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.194/26] handle="k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" host="10.0.0.4" Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.423 [INFO][2722] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:22.440843 env[1142]: 2024-02-09 10:28:22.423 [INFO][2722] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.194/26] IPv6=[] ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" HandleID="k8s-pod-network.3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.441505 env[1142]: 2024-02-09 10:28:22.424 [INFO][2710] k8s.go 385: Populated endpoint ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hk2x2" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"3fe5a3fc-ec7f-45af-a230-8342bde6911f", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-hk2x2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2e67282c91e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:22.441505 env[1142]: 2024-02-09 10:28:22.424 [INFO][2710] k8s.go 386: Calico CNI using IPs: [192.168.99.194/32] ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hk2x2" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.441505 env[1142]: 2024-02-09 10:28:22.424 [INFO][2710] dataplane_linux.go 68: Setting the host side veth name to cali2e67282c91e ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hk2x2" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.441505 env[1142]: 2024-02-09 10:28:22.429 [INFO][2710] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hk2x2" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.441505 env[1142]: 2024-02-09 10:28:22.429 [INFO][2710] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hk2x2" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"3fe5a3fc-ec7f-45af-a230-8342bde6911f", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9", Pod:"nginx-deployment-8ffc5cf85-hk2x2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2e67282c91e", MAC:"42:e9:74:6b:0f:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:22.441505 env[1142]: 2024-02-09 10:28:22.433 [INFO][2710] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hk2x2" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:22.447000 audit[2754]: NETFILTER_CFG table=filter:88 family=2 entries=40 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:22.447000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=fffffa3ec450 a2=0 a3=ffffb3537fa8 items=0 ppid=2171 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.447000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:22.456971 env[1142]: time="2024-02-09T10:28:22.456793433Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:28:22.456971 env[1142]: time="2024-02-09T10:28:22.456827792Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:28:22.456971 env[1142]: time="2024-02-09T10:28:22.456841032Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:28:22.457122 env[1142]: time="2024-02-09T10:28:22.457012152Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9 pid=2769 runtime=io.containerd.runc.v2 Feb 9 10:28:22.468726 systemd[1]: Started cri-containerd-3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9.scope. Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.486000 audit: BPF prog-id=94 op=LOAD Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2769 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364333537636434306562666164626434343735666230633835343430 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2769 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364333537636434306562666164626434343735666230633835343430 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit: BPF prog-id=95 op=LOAD Feb 9 10:28:22.487000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2769 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364333537636434306562666164626434343735666230633835343430 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit: BPF prog-id=96 op=LOAD Feb 9 10:28:22.487000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2769 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364333537636434306562666164626434343735666230633835343430 Feb 9 10:28:22.487000 audit: BPF prog-id=96 op=UNLOAD Feb 9 10:28:22.487000 audit: BPF prog-id=95 op=UNLOAD Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.487000 audit: BPF prog-id=97 op=LOAD Feb 9 10:28:22.487000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2769 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364333537636434306562666164626434343735666230633835343430 Feb 9 10:28:22.490071 systemd-resolved[1092]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:28:22.508476 env[1142]: time="2024-02-09T10:28:22.508423380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-hk2x2,Uid:3fe5a3fc-ec7f-45af-a230-8342bde6911f,Namespace:default,Attempt:1,} returns sandbox id \"3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9\"" Feb 9 10:28:22.510144 env[1142]: time="2024-02-09T10:28:22.510106412Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 10:28:22.549053 systemd-networkd[1043]: cali3c8c4dec982: Link UP Feb 9 10:28:22.550758 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3c8c4dec982: link becomes ready Feb 9 10:28:22.550167 systemd-networkd[1043]: cali3c8c4dec982: Gained carrier Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.476 [INFO][2752] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0 calico-apiserver-5898c4df76- calico-apiserver 10952aee-3ed2-4687-adad-835b7c00eb9e 1002 0 2024-02-09 10:28:22 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5898c4df76 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.4 calico-apiserver-5898c4df76-lzzr4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3c8c4dec982 [] []}} ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-lzzr4" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.476 [INFO][2752] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-lzzr4" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.503 [INFO][2794] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" HandleID="k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Workload="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.521 [INFO][2794] ipam_plugin.go 268: Auto assigning IP ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" HandleID="k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Workload="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000255a60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.4", "pod":"calico-apiserver-5898c4df76-lzzr4", "timestamp":"2024-02-09 10:28:22.503897602 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.521 [INFO][2794] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.521 [INFO][2794] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.521 [INFO][2794] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.523 [INFO][2794] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.527 [INFO][2794] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.532 [INFO][2794] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.533 [INFO][2794] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.536 [INFO][2794] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.536 [INFO][2794] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.537 [INFO][2794] ipam.go 1682: Creating new handle: k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680 Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.540 [INFO][2794] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.545 [INFO][2794] ipam.go 1216: Successfully claimed IPs: [192.168.99.195/26] block=192.168.99.192/26 handle="k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.545 [INFO][2794] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.195/26] handle="k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" host="10.0.0.4" Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.545 [INFO][2794] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:22.560199 env[1142]: 2024-02-09 10:28:22.545 [INFO][2794] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.195/26] IPv6=[] ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" HandleID="k8s-pod-network.65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Workload="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" Feb 9 10:28:22.560778 env[1142]: 2024-02-09 10:28:22.547 [INFO][2752] k8s.go 385: Populated endpoint ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-lzzr4" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0", GenerateName:"calico-apiserver-5898c4df76-", Namespace:"calico-apiserver", SelfLink:"", UID:"10952aee-3ed2-4687-adad-835b7c00eb9e", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5898c4df76", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"calico-apiserver-5898c4df76-lzzr4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3c8c4dec982", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:22.560778 env[1142]: 2024-02-09 10:28:22.547 [INFO][2752] k8s.go 386: Calico CNI using IPs: [192.168.99.195/32] ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-lzzr4" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" Feb 9 10:28:22.560778 env[1142]: 2024-02-09 10:28:22.547 [INFO][2752] dataplane_linux.go 68: Setting the host side veth name to cali3c8c4dec982 ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-lzzr4" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" Feb 9 10:28:22.560778 env[1142]: 2024-02-09 10:28:22.550 [INFO][2752] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-lzzr4" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" Feb 9 10:28:22.560778 env[1142]: 2024-02-09 10:28:22.550 [INFO][2752] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-lzzr4" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0", GenerateName:"calico-apiserver-5898c4df76-", Namespace:"calico-apiserver", SelfLink:"", UID:"10952aee-3ed2-4687-adad-835b7c00eb9e", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5898c4df76", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680", Pod:"calico-apiserver-5898c4df76-lzzr4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3c8c4dec982", MAC:"aa:da:63:8f:52:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:22.560778 env[1142]: 2024-02-09 10:28:22.556 [INFO][2752] k8s.go 491: Wrote updated endpoint to datastore ContainerID="65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-lzzr4" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--5898c4df76--lzzr4-eth0" Feb 9 10:28:22.574721 env[1142]: time="2024-02-09T10:28:22.574652376Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:28:22.574721 env[1142]: time="2024-02-09T10:28:22.574691296Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:28:22.574885 env[1142]: time="2024-02-09T10:28:22.574848415Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:28:22.575128 env[1142]: time="2024-02-09T10:28:22.575080094Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680 pid=2837 runtime=io.containerd.runc.v2 Feb 9 10:28:22.575000 audit[2844]: NETFILTER_CFG table=filter:89 family=2 entries=51 op=nft_register_chain pid=2844 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:22.575000 audit[2844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26916 a0=3 a1=ffffec4228c0 a2=0 a3=ffff9f59bfa8 items=0 ppid=2171 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.575000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:22.585740 systemd[1]: Started cri-containerd-65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680.scope. Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit: BPF prog-id=98 op=LOAD Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2837 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333837666362363239336466336331323632353035653061303631 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2837 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333837666362363239336466336331323632353035653061303631 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit: BPF prog-id=99 op=LOAD Feb 9 10:28:22.615000 audit[2848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2837 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333837666362363239336466336331323632353035653061303631 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.615000 audit: BPF prog-id=100 op=LOAD Feb 9 10:28:22.615000 audit[2848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2837 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333837666362363239336466336331323632353035653061303631 Feb 9 10:28:22.615000 audit: BPF prog-id=100 op=UNLOAD Feb 9 10:28:22.615000 audit: BPF prog-id=99 op=UNLOAD Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:22.616000 audit: BPF prog-id=101 op=LOAD Feb 9 10:28:22.616000 audit[2848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2837 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333837666362363239336466336331323632353035653061303631 Feb 9 10:28:22.617844 systemd-resolved[1092]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:28:22.633558 env[1142]: time="2024-02-09T10:28:22.633512889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5898c4df76-lzzr4,Uid:10952aee-3ed2-4687-adad-835b7c00eb9e,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680\"" Feb 9 10:28:23.109266 kubelet[1443]: E0209 10:28:23.109224 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:23.562690 systemd-networkd[1043]: cali2e67282c91e: Gained IPv6LL Feb 9 10:28:23.563141 systemd-networkd[1043]: cali3c8c4dec982: Gained IPv6LL Feb 9 10:28:24.109591 kubelet[1443]: E0209 10:28:24.109547 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:25.045154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount869201088.mount: Deactivated successfully. Feb 9 10:28:25.110047 kubelet[1443]: E0209 10:28:25.110001 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:25.929679 env[1142]: time="2024-02-09T10:28:25.929615075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:25.931861 env[1142]: time="2024-02-09T10:28:25.931811466Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:25.934036 env[1142]: time="2024-02-09T10:28:25.934004496Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:25.935447 env[1142]: time="2024-02-09T10:28:25.935411810Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:25.936123 env[1142]: time="2024-02-09T10:28:25.936065087Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 10:28:25.936593 env[1142]: time="2024-02-09T10:28:25.936574565Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 10:28:25.938344 env[1142]: time="2024-02-09T10:28:25.938295478Z" level=info msg="CreateContainer within sandbox \"3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 10:28:25.947870 env[1142]: time="2024-02-09T10:28:25.947829877Z" level=info msg="CreateContainer within sandbox \"3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"65a1a824e29446868b9aeadbdc393ed6f8b30779aaa30e39e0f3d4328c6909bc\"" Feb 9 10:28:25.948452 env[1142]: time="2024-02-09T10:28:25.948420834Z" level=info msg="StartContainer for \"65a1a824e29446868b9aeadbdc393ed6f8b30779aaa30e39e0f3d4328c6909bc\"" Feb 9 10:28:25.964479 systemd[1]: Started cri-containerd-65a1a824e29446868b9aeadbdc393ed6f8b30779aaa30e39e0f3d4328c6909bc.scope. Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.992000 audit: BPF prog-id=102 op=LOAD Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2769 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:25.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613161383234653239343436383638623961656164626463333933 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2769 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:25.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613161383234653239343436383638623961656164626463333933 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit: BPF prog-id=103 op=LOAD Feb 9 10:28:25.993000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2769 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:25.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613161383234653239343436383638623961656164626463333933 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit: BPF prog-id=104 op=LOAD Feb 9 10:28:25.993000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2769 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:25.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613161383234653239343436383638623961656164626463333933 Feb 9 10:28:25.993000 audit: BPF prog-id=104 op=UNLOAD Feb 9 10:28:25.993000 audit: BPF prog-id=103 op=UNLOAD Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:25.993000 audit: BPF prog-id=105 op=LOAD Feb 9 10:28:25.993000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2769 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:25.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613161383234653239343436383638623961656164626463333933 Feb 9 10:28:26.010225 env[1142]: time="2024-02-09T10:28:26.010096970Z" level=info msg="StartContainer for \"65a1a824e29446868b9aeadbdc393ed6f8b30779aaa30e39e0f3d4328c6909bc\" returns successfully" Feb 9 10:28:26.110291 kubelet[1443]: E0209 10:28:26.110252 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:27.110885 kubelet[1443]: E0209 10:28:27.110840 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:27.505000 audit[2957]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:27.508523 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 10:28:27.508583 kernel: audit: type=1325 audit(1707474507.505:782): table=filter:90 family=2 entries=8 op=nft_register_rule pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:27.508608 kernel: audit: type=1300 audit(1707474507.505:782): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffee624220 a2=0 a3=ffffbd7a06c0 items=0 ppid=1677 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.505000 audit[2957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffee624220 a2=0 a3=ffffbd7a06c0 items=0 ppid=1677 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.511251 kernel: audit: type=1327 audit(1707474507.505:782): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:27.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:27.505000 audit[2957]: NETFILTER_CFG table=nat:91 family=2 entries=78 op=nft_register_rule pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:27.505000 audit[2957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffee624220 a2=0 a3=ffffbd7a06c0 items=0 ppid=1677 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.522617 kernel: audit: type=1325 audit(1707474507.505:783): table=nat:91 family=2 entries=78 op=nft_register_rule pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:27.522682 kernel: audit: type=1300 audit(1707474507.505:783): arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffee624220 a2=0 a3=ffffbd7a06c0 items=0 ppid=1677 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.522706 kernel: audit: type=1327 audit(1707474507.505:783): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:27.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:27.893609 env[1142]: time="2024-02-09T10:28:27.893545714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:27.895047 env[1142]: time="2024-02-09T10:28:27.895011708Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:27.896445 env[1142]: time="2024-02-09T10:28:27.896414143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:27.898234 env[1142]: time="2024-02-09T10:28:27.898182576Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:27.898801 env[1142]: time="2024-02-09T10:28:27.898760453Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 10:28:27.901218 env[1142]: time="2024-02-09T10:28:27.901179004Z" level=info msg="CreateContainer within sandbox \"65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 10:28:27.910235 env[1142]: time="2024-02-09T10:28:27.910193608Z" level=info msg="CreateContainer within sandbox \"65387fcb6293df3c1262505e0a061caf71a2c0b42c8f4267d2b6c36310a78680\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0d09b614ac5f31e2a3ceff03a77259b7a3abc345d2ca2f6d6ef7ffa590c1f860\"" Feb 9 10:28:27.910838 env[1142]: time="2024-02-09T10:28:27.910797845Z" level=info msg="StartContainer for \"0d09b614ac5f31e2a3ceff03a77259b7a3abc345d2ca2f6d6ef7ffa590c1f860\"" Feb 9 10:28:27.925231 systemd[1]: Started cri-containerd-0d09b614ac5f31e2a3ceff03a77259b7a3abc345d2ca2f6d6ef7ffa590c1f860.scope. Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.961773 kernel: audit: type=1400 audit(1707474507.956:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.961830 kernel: audit: type=1400 audit(1707474507.956:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.961853 kernel: audit: type=1400 audit(1707474507.956:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965248 kernel: audit: type=1400 audit(1707474507.956:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.958000 audit: BPF prog-id=106 op=LOAD Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2837 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303962363134616335663331653261336365666630336137373235 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2837 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303962363134616335663331653261336365666630336137373235 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.960000 audit: BPF prog-id=107 op=LOAD Feb 9 10:28:27.960000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2837 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303962363134616335663331653261336365666630336137373235 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.962000 audit: BPF prog-id=108 op=LOAD Feb 9 10:28:27.962000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2837 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303962363134616335663331653261336365666630336137373235 Feb 9 10:28:27.965000 audit: BPF prog-id=108 op=UNLOAD Feb 9 10:28:27.965000 audit: BPF prog-id=107 op=UNLOAD Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:27.965000 audit: BPF prog-id=109 op=LOAD Feb 9 10:28:27.965000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2837 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303962363134616335663331653261336365666630336137373235 Feb 9 10:28:27.993677 env[1142]: time="2024-02-09T10:28:27.993622676Z" level=info msg="StartContainer for \"0d09b614ac5f31e2a3ceff03a77259b7a3abc345d2ca2f6d6ef7ffa590c1f860\" returns successfully" Feb 9 10:28:28.111660 kubelet[1443]: E0209 10:28:28.111588 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:28.348696 kubelet[1443]: I0209 10:28:28.348597 1443 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-hk2x2" podStartSLOduration=-9.223372014506212e+09 pod.CreationTimestamp="2024-02-09 10:28:06 +0000 UTC" firstStartedPulling="2024-02-09 10:28:22.509608214 +0000 UTC m=+47.684168823" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:28:26.342510954 +0000 UTC m=+51.517071563" watchObservedRunningTime="2024-02-09 10:28:28.348564434 +0000 UTC m=+53.523125083" Feb 9 10:28:28.378000 audit[3024]: NETFILTER_CFG table=filter:92 family=2 entries=8 op=nft_register_rule pid=3024 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:28.378000 audit[3024]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffcdb8a060 a2=0 a3=ffff96a596c0 items=0 ppid=1677 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:28.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:28.380000 audit[3024]: NETFILTER_CFG table=nat:93 family=2 entries=78 op=nft_register_rule pid=3024 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:28.380000 audit[3024]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffcdb8a060 a2=0 a3=ffff96a596c0 items=0 ppid=1677 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:28.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:28.764000 audit[2978]: AVC avc: denied { watch } for pid=2978 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_28_22.2910570620/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c438,c515 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c438,c515 tclass=file permissive=0 Feb 9 10:28:28.764000 audit[2978]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c966c0 a2=fc6 a3=0 items=0 ppid=2837 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c438,c515 key=(null) Feb 9 10:28:28.764000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:28:29.030000 audit[3053]: NETFILTER_CFG table=filter:94 family=2 entries=20 op=nft_register_rule pid=3053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:29.030000 audit[3053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11068 a0=3 a1=fffffc451340 a2=0 a3=ffff86c246c0 items=0 ppid=1677 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.030000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:29.032000 audit[3053]: NETFILTER_CFG table=nat:95 family=2 entries=78 op=nft_register_rule pid=3053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:29.032000 audit[3053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffffc451340 a2=0 a3=ffff86c246c0 items=0 ppid=1677 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.032000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:29.059300 kubelet[1443]: I0209 10:28:29.058935 1443 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5898c4df76-lzzr4" podStartSLOduration=-9.223372029795893e+09 pod.CreationTimestamp="2024-02-09 10:28:22 +0000 UTC" firstStartedPulling="2024-02-09 10:28:22.634514764 +0000 UTC m=+47.809075413" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:28:28.349939109 +0000 UTC m=+53.524499758" watchObservedRunningTime="2024-02-09 10:28:29.0588836 +0000 UTC m=+54.233444249" Feb 9 10:28:29.059300 kubelet[1443]: I0209 10:28:29.059301 1443 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:28:29.064206 systemd[1]: Created slice kubepods-besteffort-pod1a7b466d_04f8_4993_98ae_0cf1c3ea22e0.slice. Feb 9 10:28:29.111778 kubelet[1443]: E0209 10:28:29.111737 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:29.155985 kubelet[1443]: I0209 10:28:29.155951 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/1a7b466d-04f8-4993-98ae-0cf1c3ea22e0-data\") pod \"nfs-server-provisioner-0\" (UID: \"1a7b466d-04f8-4993-98ae-0cf1c3ea22e0\") " pod="default/nfs-server-provisioner-0" Feb 9 10:28:29.156107 kubelet[1443]: I0209 10:28:29.156012 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nxrkk\" (UniqueName: \"kubernetes.io/projected/1a7b466d-04f8-4993-98ae-0cf1c3ea22e0-kube-api-access-nxrkk\") pod \"nfs-server-provisioner-0\" (UID: \"1a7b466d-04f8-4993-98ae-0cf1c3ea22e0\") " pod="default/nfs-server-provisioner-0" Feb 9 10:28:29.366697 env[1142]: time="2024-02-09T10:28:29.366292945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1a7b466d-04f8-4993-98ae-0cf1c3ea22e0,Namespace:default,Attempt:0,}" Feb 9 10:28:29.492889 systemd-networkd[1043]: cali60e51b789ff: Link UP Feb 9 10:28:29.495066 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:28:29.495138 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 10:28:29.495083 systemd-networkd[1043]: cali60e51b789ff: Gained carrier Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.421 [INFO][3061] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 1a7b466d-04f8-4993-98ae-0cf1c3ea22e0 1077 0 2024-02-09 10:28:29 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.4 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.421 [INFO][3061] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.444 [INFO][3069] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" HandleID="k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.461 [INFO][3069] ipam_plugin.go 268: Auto assigning IP ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" HandleID="k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000c5860), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 10:28:29.444687056 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.461 [INFO][3069] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.461 [INFO][3069] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.461 [INFO][3069] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.463 [INFO][3069] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.467 [INFO][3069] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.473 [INFO][3069] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.475 [INFO][3069] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.478 [INFO][3069] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.478 [INFO][3069] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.479 [INFO][3069] ipam.go 1682: Creating new handle: k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.483 [INFO][3069] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.489 [INFO][3069] ipam.go 1216: Successfully claimed IPs: [192.168.99.196/26] block=192.168.99.192/26 handle="k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.489 [INFO][3069] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.196/26] handle="k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" host="10.0.0.4" Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.489 [INFO][3069] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:29.507540 env[1142]: 2024-02-09 10:28:29.489 [INFO][3069] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.196/26] IPv6=[] ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" HandleID="k8s-pod-network.086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:28:29.510143 env[1142]: 2024-02-09 10:28:29.490 [INFO][3061] k8s.go 385: Populated endpoint ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1a7b466d-04f8-4993-98ae-0cf1c3ea22e0", ResourceVersion:"1077", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:29.510143 env[1142]: 2024-02-09 10:28:29.490 [INFO][3061] k8s.go 386: Calico CNI using IPs: [192.168.99.196/32] ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:28:29.510143 env[1142]: 2024-02-09 10:28:29.490 [INFO][3061] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:28:29.510143 env[1142]: 2024-02-09 10:28:29.495 [INFO][3061] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:28:29.510375 env[1142]: 2024-02-09 10:28:29.495 [INFO][3061] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1a7b466d-04f8-4993-98ae-0cf1c3ea22e0", ResourceVersion:"1077", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8a:74:f1:be:4f:e6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:29.510375 env[1142]: 2024-02-09 10:28:29.505 [INFO][3061] k8s.go 491: Wrote updated endpoint to datastore ContainerID="086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:28:29.520000 audit[3104]: NETFILTER_CFG table=filter:96 family=2 entries=42 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:29.522294 env[1142]: time="2024-02-09T10:28:29.521309333Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:28:29.522294 env[1142]: time="2024-02-09T10:28:29.521383293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:28:29.522294 env[1142]: time="2024-02-09T10:28:29.521393693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:28:29.522294 env[1142]: time="2024-02-09T10:28:29.521509172Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd pid=3103 runtime=io.containerd.runc.v2 Feb 9 10:28:29.520000 audit[3104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20688 a0=3 a1=ffffead37540 a2=0 a3=ffffa2eacfa8 items=0 ppid=2171 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.520000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:29.533744 systemd[1]: Started cri-containerd-086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd.scope. Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.571000 audit: BPF prog-id=110 op=LOAD Feb 9 10:28:29.571000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.571000 audit[3112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3103 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363731396261343365373038366661663939303861633339323932 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3103 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363731396261343365373038366661663939303861633339323932 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit: BPF prog-id=111 op=LOAD Feb 9 10:28:29.572000 audit[3112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3103 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363731396261343365373038366661663939303861633339323932 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.572000 audit: BPF prog-id=112 op=LOAD Feb 9 10:28:29.572000 audit[3112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3103 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363731396261343365373038366661663939303861633339323932 Feb 9 10:28:29.573000 audit: BPF prog-id=112 op=UNLOAD Feb 9 10:28:29.573000 audit: BPF prog-id=111 op=UNLOAD Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:29.573000 audit: BPF prog-id=113 op=LOAD Feb 9 10:28:29.573000 audit[3112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3103 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363731396261343365373038366661663939303861633339323932 Feb 9 10:28:29.576063 systemd-resolved[1092]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:28:29.594523 env[1142]: time="2024-02-09T10:28:29.594476143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1a7b466d-04f8-4993-98ae-0cf1c3ea22e0,Namespace:default,Attempt:0,} returns sandbox id \"086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd\"" Feb 9 10:28:29.595729 env[1142]: time="2024-02-09T10:28:29.595696378Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 10:28:30.069000 audit[3161]: NETFILTER_CFG table=filter:97 family=2 entries=32 op=nft_register_rule pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:30.069000 audit[3161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11068 a0=3 a1=ffffe189d3f0 a2=0 a3=ffffaffaf6c0 items=0 ppid=1677 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:30.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:30.071000 audit[3161]: NETFILTER_CFG table=nat:98 family=2 entries=78 op=nft_register_rule pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:30.071000 audit[3161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe189d3f0 a2=0 a3=ffffaffaf6c0 items=0 ppid=1677 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:30.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:30.113048 kubelet[1443]: E0209 10:28:30.113007 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:30.272620 systemd[1]: run-containerd-runc-k8s.io-086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd-runc.tWZJzN.mount: Deactivated successfully. Feb 9 10:28:31.113740 kubelet[1443]: E0209 10:28:31.113694 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:31.497486 systemd-networkd[1043]: cali60e51b789ff: Gained IPv6LL Feb 9 10:28:32.095682 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2637783547.mount: Deactivated successfully. Feb 9 10:28:32.114240 kubelet[1443]: E0209 10:28:32.114216 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:33.115046 kubelet[1443]: E0209 10:28:33.114998 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:33.791424 env[1142]: time="2024-02-09T10:28:33.791361937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:33.792834 env[1142]: time="2024-02-09T10:28:33.792804613Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:33.794556 env[1142]: time="2024-02-09T10:28:33.794530727Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:33.795897 env[1142]: time="2024-02-09T10:28:33.795876883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:33.797324 env[1142]: time="2024-02-09T10:28:33.797284478Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 9 10:28:33.798918 env[1142]: time="2024-02-09T10:28:33.798872353Z" level=info msg="CreateContainer within sandbox \"086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 10:28:33.809834 env[1142]: time="2024-02-09T10:28:33.809783318Z" level=info msg="CreateContainer within sandbox \"086719ba43e7086faf9908ac392924aeb4683269e6c60b991e0fe57bc7e98ccd\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"778cfc4a8e12558f28faff1333cc16697c7607762d1275d627dece54569de98c\"" Feb 9 10:28:33.810279 env[1142]: time="2024-02-09T10:28:33.810244956Z" level=info msg="StartContainer for \"778cfc4a8e12558f28faff1333cc16697c7607762d1275d627dece54569de98c\"" Feb 9 10:28:33.828810 systemd[1]: run-containerd-runc-k8s.io-778cfc4a8e12558f28faff1333cc16697c7607762d1275d627dece54569de98c-runc.NTERgZ.mount: Deactivated successfully. Feb 9 10:28:33.830054 systemd[1]: Started cri-containerd-778cfc4a8e12558f28faff1333cc16697c7607762d1275d627dece54569de98c.scope. Feb 9 10:28:33.854451 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 9 10:28:33.854542 kernel: audit: type=1400 audit(1707474513.852:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.857821 kernel: audit: type=1400 audit(1707474513.852:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.857870 kernel: audit: type=1400 audit(1707474513.852:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.859539 kernel: audit: type=1400 audit(1707474513.852:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.863056 kernel: audit: type=1400 audit(1707474513.852:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.863089 kernel: audit: type=1400 audit(1707474513.852:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.866538 kernel: audit: type=1400 audit(1707474513.852:834): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.866575 kernel: audit: type=1400 audit(1707474513.852:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.873346 kernel: audit: type=1400 audit(1707474513.852:836): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.873465 kernel: audit: type=1400 audit(1707474513.853:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit: BPF prog-id=114 op=LOAD Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3103 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:33.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737386366633461386531323535386632386661666631333333636331 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3103 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:33.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737386366633461386531323535386632386661666631333333636331 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.853000 audit: BPF prog-id=115 op=LOAD Feb 9 10:28:33.853000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3103 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:33.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737386366633461386531323535386632386661666631333333636331 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.854000 audit: BPF prog-id=116 op=LOAD Feb 9 10:28:33.854000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3103 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:33.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737386366633461386531323535386632386661666631333333636331 Feb 9 10:28:33.856000 audit: BPF prog-id=116 op=UNLOAD Feb 9 10:28:33.856000 audit: BPF prog-id=115 op=UNLOAD Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:33.856000 audit: BPF prog-id=117 op=LOAD Feb 9 10:28:33.856000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3103 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:33.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737386366633461386531323535386632386661666631333333636331 Feb 9 10:28:33.950634 env[1142]: time="2024-02-09T10:28:33.950581745Z" level=info msg="StartContainer for \"778cfc4a8e12558f28faff1333cc16697c7607762d1275d627dece54569de98c\" returns successfully" Feb 9 10:28:34.010000 audit[3206]: AVC avc: denied { search } for pid=3206 comm="rpcbind" name="crypto" dev="proc" ino=19059 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:28:34.010000 audit[3206]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa76bf000 a2=0 a3=0 items=0 ppid=3189 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 key=(null) Feb 9 10:28:34.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 10:28:34.046000 audit[3211]: AVC avc: denied { search } for pid=3211 comm="dbus-daemon" name="crypto" dev="proc" ino=19059 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:28:34.046000 audit[3211]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa47cf000 a2=0 a3=0 items=0 ppid=3189 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 key=(null) Feb 9 10:28:34.046000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 10:28:34.059000 audit[3212]: AVC avc: denied { watch } for pid=3212 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538042 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c127,c471 tclass=dir permissive=0 Feb 9 10:28:34.059000 audit[3212]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaafad67ce0 a2=2c8 a3=aaaafad63a60 items=0 ppid=3189 pid=3212 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 key=(null) Feb 9 10:28:34.059000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 10:28:34.063000 audit[3213]: AVC avc: denied { read } for pid=3213 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18063 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 10:28:34.063000 audit[3213]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff84cfa570 a2=80000 a3=0 items=0 ppid=3189 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 key=(null) Feb 9 10:28:34.063000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 10:28:34.063000 audit[3213]: AVC avc: denied { search } for pid=3213 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19059 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:28:34.063000 audit[3213]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8408f000 a2=0 a3=0 items=0 ppid=3189 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c471 key=(null) Feb 9 10:28:34.063000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 10:28:34.115426 kubelet[1443]: E0209 10:28:34.115384 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:34.360372 kubelet[1443]: I0209 10:28:34.359911 1443 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372031494896e+09 pod.CreationTimestamp="2024-02-09 10:28:29 +0000 UTC" firstStartedPulling="2024-02-09 10:28:29.595472939 +0000 UTC m=+54.770033548" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:28:34.359633666 +0000 UTC m=+59.534194275" watchObservedRunningTime="2024-02-09 10:28:34.359879505 +0000 UTC m=+59.534440154" Feb 9 10:28:34.391000 audit[3255]: NETFILTER_CFG table=filter:99 family=2 entries=20 op=nft_register_rule pid=3255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:34.391000 audit[3255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff1ea1900 a2=0 a3=ffffa18436c0 items=0 ppid=1677 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:34.394000 audit[3255]: NETFILTER_CFG table=nat:100 family=2 entries=162 op=nft_register_chain pid=3255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:34.394000 audit[3255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=66940 a0=3 a1=fffff1ea1900 a2=0 a3=ffffa18436c0 items=0 ppid=1677 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:35.116245 kubelet[1443]: E0209 10:28:35.116210 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:36.074956 kubelet[1443]: E0209 10:28:36.074906 1443 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:36.089385 env[1142]: time="2024-02-09T10:28:36.089348150Z" level=info msg="StopPodSandbox for \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\"" Feb 9 10:28:36.116458 kubelet[1443]: E0209 10:28:36.116410 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.126 [WARNING][3274] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-csi--node--driver--vrcxw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"82b9abe5-1c35-4a98-b351-a5e69b43486f", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55", Pod:"csi-node-driver-vrcxw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5ef154ddc52", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.127 [INFO][3274] k8s.go 578: Cleaning up netns ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.127 [INFO][3274] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" iface="eth0" netns="" Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.127 [INFO][3274] k8s.go 585: Releasing IP address(es) ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.127 [INFO][3274] utils.go 188: Calico CNI releasing IP address ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.146 [INFO][3282] ipam_plugin.go 415: Releasing address using handleID ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.146 [INFO][3282] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.146 [INFO][3282] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.155 [WARNING][3282] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.155 [INFO][3282] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.157 [INFO][3282] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:36.159211 env[1142]: 2024-02-09 10:28:36.158 [INFO][3274] k8s.go 591: Teardown processing complete. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:36.159687 env[1142]: time="2024-02-09T10:28:36.159240025Z" level=info msg="TearDown network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\" successfully" Feb 9 10:28:36.159687 env[1142]: time="2024-02-09T10:28:36.159267185Z" level=info msg="StopPodSandbox for \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\" returns successfully" Feb 9 10:28:36.159978 env[1142]: time="2024-02-09T10:28:36.159948783Z" level=info msg="RemovePodSandbox for \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\"" Feb 9 10:28:36.160098 env[1142]: time="2024-02-09T10:28:36.160061143Z" level=info msg="Forcibly stopping sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\"" Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.197 [WARNING][3305] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-csi--node--driver--vrcxw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"82b9abe5-1c35-4a98-b351-a5e69b43486f", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"115a078e528e2579fc1110a8c07a5c58554f0de74e0d18a57709dbe5f9e81b55", Pod:"csi-node-driver-vrcxw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5ef154ddc52", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.197 [INFO][3305] k8s.go 578: Cleaning up netns ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.197 [INFO][3305] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" iface="eth0" netns="" Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.197 [INFO][3305] k8s.go 585: Releasing IP address(es) ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.197 [INFO][3305] utils.go 188: Calico CNI releasing IP address ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.212 [INFO][3314] ipam_plugin.go 415: Releasing address using handleID ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.212 [INFO][3314] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.212 [INFO][3314] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.222 [WARNING][3314] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.222 [INFO][3314] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" HandleID="k8s-pod-network.0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Workload="10.0.0.4-k8s-csi--node--driver--vrcxw-eth0" Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.224 [INFO][3314] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:36.226266 env[1142]: 2024-02-09 10:28:36.225 [INFO][3305] k8s.go 591: Teardown processing complete. ContainerID="0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214" Feb 9 10:28:36.226770 env[1142]: time="2024-02-09T10:28:36.226727988Z" level=info msg="TearDown network for sandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\" successfully" Feb 9 10:28:36.277648 env[1142]: time="2024-02-09T10:28:36.277604039Z" level=info msg="RemovePodSandbox \"0aae73b1445628b98cda5c5987376084c4c0a121d4f417add212f8a0b7981214\" returns successfully" Feb 9 10:28:36.278309 env[1142]: time="2024-02-09T10:28:36.278270357Z" level=info msg="StopPodSandbox for \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\"" Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.308 [WARNING][3338] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"3fe5a3fc-ec7f-45af-a230-8342bde6911f", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9", Pod:"nginx-deployment-8ffc5cf85-hk2x2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2e67282c91e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.308 [INFO][3338] k8s.go 578: Cleaning up netns ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.309 [INFO][3338] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" iface="eth0" netns="" Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.309 [INFO][3338] k8s.go 585: Releasing IP address(es) ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.309 [INFO][3338] utils.go 188: Calico CNI releasing IP address ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.323 [INFO][3345] ipam_plugin.go 415: Releasing address using handleID ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.323 [INFO][3345] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.323 [INFO][3345] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.333 [WARNING][3345] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.333 [INFO][3345] ipam_plugin.go 443: Releasing address using workloadID ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.334 [INFO][3345] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:36.337066 env[1142]: 2024-02-09 10:28:36.335 [INFO][3338] k8s.go 591: Teardown processing complete. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:36.337066 env[1142]: time="2024-02-09T10:28:36.337039384Z" level=info msg="TearDown network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\" successfully" Feb 9 10:28:36.337066 env[1142]: time="2024-02-09T10:28:36.337067144Z" level=info msg="StopPodSandbox for \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\" returns successfully" Feb 9 10:28:36.338265 env[1142]: time="2024-02-09T10:28:36.338219301Z" level=info msg="RemovePodSandbox for \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\"" Feb 9 10:28:36.338308 env[1142]: time="2024-02-09T10:28:36.338262741Z" level=info msg="Forcibly stopping sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\"" Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.373 [WARNING][3368] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"3fe5a3fc-ec7f-45af-a230-8342bde6911f", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"3d357cd40ebfadbd4475fb0c854401eba53b7563c98eaf5a0506a0c47d4794f9", Pod:"nginx-deployment-8ffc5cf85-hk2x2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2e67282c91e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.373 [INFO][3368] k8s.go 578: Cleaning up netns ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.373 [INFO][3368] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" iface="eth0" netns="" Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.373 [INFO][3368] k8s.go 585: Releasing IP address(es) ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.373 [INFO][3368] utils.go 188: Calico CNI releasing IP address ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.388 [INFO][3375] ipam_plugin.go 415: Releasing address using handleID ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.388 [INFO][3375] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.389 [INFO][3375] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.398 [WARNING][3375] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.398 [INFO][3375] ipam_plugin.go 443: Releasing address using workloadID ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" HandleID="k8s-pod-network.456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--hk2x2-eth0" Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.399 [INFO][3375] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:36.401825 env[1142]: 2024-02-09 10:28:36.400 [INFO][3368] k8s.go 591: Teardown processing complete. ContainerID="456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd" Feb 9 10:28:36.402218 env[1142]: time="2024-02-09T10:28:36.401847875Z" level=info msg="TearDown network for sandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\" successfully" Feb 9 10:28:36.404090 env[1142]: time="2024-02-09T10:28:36.404053068Z" level=info msg="RemovePodSandbox \"456c1b908196e1f359489716435658ad76f2e00cec84aac6a28a75ca4dcec0bd\" returns successfully" Feb 9 10:28:37.117212 kubelet[1443]: E0209 10:28:37.117175 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:38.118248 kubelet[1443]: E0209 10:28:38.118213 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:39.118756 kubelet[1443]: E0209 10:28:39.118700 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:40.119617 kubelet[1443]: E0209 10:28:40.119561 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:41.119710 kubelet[1443]: E0209 10:28:41.119655 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:42.120078 kubelet[1443]: E0209 10:28:42.120042 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:43.120663 kubelet[1443]: E0209 10:28:43.120630 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:43.545354 kubelet[1443]: I0209 10:28:43.545304 1443 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:28:43.550002 systemd[1]: Created slice kubepods-besteffort-pod74a0ee30_9a75_45e1_a80c_71e32312e8ee.slice. Feb 9 10:28:43.632643 kubelet[1443]: I0209 10:28:43.632607 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-8c0adf7b-43dd-4f48-862d-f8dac0a7f0fb\" (UniqueName: \"kubernetes.io/nfs/74a0ee30-9a75-45e1-a80c-71e32312e8ee-pvc-8c0adf7b-43dd-4f48-862d-f8dac0a7f0fb\") pod \"test-pod-1\" (UID: \"74a0ee30-9a75-45e1-a80c-71e32312e8ee\") " pod="default/test-pod-1" Feb 9 10:28:43.632733 kubelet[1443]: I0209 10:28:43.632652 1443 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmnn7\" (UniqueName: \"kubernetes.io/projected/74a0ee30-9a75-45e1-a80c-71e32312e8ee-kube-api-access-hmnn7\") pod \"test-pod-1\" (UID: \"74a0ee30-9a75-45e1-a80c-71e32312e8ee\") " pod="default/test-pod-1" Feb 9 10:28:43.748000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.751699 kernel: Failed to create system directory netfs Feb 9 10:28:43.751759 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 10:28:43.751778 kernel: audit: type=1400 audit(1707474523.748:853): avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.751800 kernel: Failed to create system directory netfs Feb 9 10:28:43.751818 kernel: audit: type=1400 audit(1707474523.748:853): avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.748000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.748000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.758163 kernel: Failed to create system directory netfs Feb 9 10:28:43.758193 kernel: audit: type=1400 audit(1707474523.748:853): avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.758221 kernel: Failed to create system directory netfs Feb 9 10:28:43.758254 kernel: audit: type=1400 audit(1707474523.748:853): avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.748000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.748000 audit[3391]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad42a65e0 a1=12c14 a2=aaaad11ee028 a3=aaaad4297010 items=0 ppid=9 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:43.748000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:28:43.764937 kernel: audit: type=1300 audit(1707474523.748:853): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad42a65e0 a1=12c14 a2=aaaad11ee028 a3=aaaad4297010 items=0 ppid=9 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:43.765013 kernel: audit: type=1327 audit(1707474523.748:853): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.772068 kernel: Failed to create system directory fscache Feb 9 10:28:43.772108 kernel: audit: type=1400 audit(1707474523.765:854): avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.772124 kernel: Failed to create system directory fscache Feb 9 10:28:43.772137 kernel: audit: type=1400 audit(1707474523.765:854): avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.774339 kernel: Failed to create system directory fscache Feb 9 10:28:43.774397 kernel: audit: type=1400 audit(1707474523.765:854): avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.776594 kernel: Failed to create system directory fscache Feb 9 10:28:43.776622 kernel: audit: type=1400 audit(1707474523.765:854): avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.778890 kernel: Failed to create system directory fscache Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.779327 kernel: Failed to create system directory fscache Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.780568 kernel: Failed to create system directory fscache Feb 9 10:28:43.780598 kernel: Failed to create system directory fscache Feb 9 10:28:43.780614 kernel: Failed to create system directory fscache Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.781376 kernel: Failed to create system directory fscache Feb 9 10:28:43.781399 kernel: Failed to create system directory fscache Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.782595 kernel: Failed to create system directory fscache Feb 9 10:28:43.782615 kernel: Failed to create system directory fscache Feb 9 10:28:43.782630 kernel: Failed to create system directory fscache Feb 9 10:28:43.765000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.785335 kernel: FS-Cache: Loaded Feb 9 10:28:43.765000 audit[3391]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad44b9210 a1=4c344 a2=aaaad11ee028 a3=aaaad4297010 items=0 ppid=9 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:43.765000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.803752 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.803800 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.803815 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.805471 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.805498 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.805513 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.806700 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.806724 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.806738 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.807504 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.807531 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.808321 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.808343 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.809515 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.809540 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.809554 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.810730 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.810745 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.810763 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.811531 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.811550 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.812328 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.812356 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.813519 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.813536 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.813549 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.814327 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.814352 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.815513 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.815530 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.815551 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.816731 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.816755 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.816770 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.817530 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.817545 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.818322 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.818342 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.819519 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.819540 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.819559 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.820726 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.820751 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.820765 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.821534 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.821555 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.822328 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.822348 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.823517 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.823533 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.823552 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.824729 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.824753 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.824779 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.825528 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.825544 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.826333 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.826360 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.827533 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.827550 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.827563 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.828324 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.828339 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.829519 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.829547 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.829566 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.830726 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.830742 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.830763 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.831532 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.831552 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.832328 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.832347 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.833522 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.833538 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.833554 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.834320 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.834337 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.835514 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.835538 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.835552 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.836740 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.836762 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.836776 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.837544 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.837559 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.838341 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.838369 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.839546 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.839568 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.839581 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.840340 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.840358 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.841544 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.841560 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.841573 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.842350 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.842366 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.843550 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.843566 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.843579 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.844346 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.844363 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.845543 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.845564 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.845580 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.846332 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.846353 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.847528 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.847550 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.847564 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.848330 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.848357 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.849516 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.849539 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.849552 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.850728 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.850751 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.850771 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.851529 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.851550 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.852321 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.852339 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.853520 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.853535 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.853553 kernel: Failed to create system directory sunrpc Feb 9 10:28:43.796000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.862654 kernel: RPC: Registered named UNIX socket transport module. Feb 9 10:28:43.862715 kernel: RPC: Registered udp transport module. Feb 9 10:28:43.862738 kernel: RPC: Registered tcp transport module. Feb 9 10:28:43.862754 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 10:28:43.796000 audit[3391]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad4505560 a1=fbb6c a2=aaaad11ee028 a3=aaaad4297010 items=6 ppid=9 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:43.796000 audit: CWD cwd="/" Feb 9 10:28:43.796000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:43.796000 audit: PATH item=1 name=(null) inode=20725 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:43.796000 audit: PATH item=2 name=(null) inode=20725 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:43.796000 audit: PATH item=3 name=(null) inode=20726 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:43.796000 audit: PATH item=4 name=(null) inode=20725 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:43.796000 audit: PATH item=5 name=(null) inode=20727 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:43.796000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.886628 kernel: Failed to create system directory nfs Feb 9 10:28:43.886660 kernel: Failed to create system directory nfs Feb 9 10:28:43.886687 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.887386 kernel: Failed to create system directory nfs Feb 9 10:28:43.887415 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.888546 kernel: Failed to create system directory nfs Feb 9 10:28:43.888564 kernel: Failed to create system directory nfs Feb 9 10:28:43.888584 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.889361 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.890552 kernel: Failed to create system directory nfs Feb 9 10:28:43.890569 kernel: Failed to create system directory nfs Feb 9 10:28:43.890587 kernel: Failed to create system directory nfs Feb 9 10:28:43.890601 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.891343 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.892525 kernel: Failed to create system directory nfs Feb 9 10:28:43.892541 kernel: Failed to create system directory nfs Feb 9 10:28:43.892559 kernel: Failed to create system directory nfs Feb 9 10:28:43.892572 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.893323 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.894500 kernel: Failed to create system directory nfs Feb 9 10:28:43.894521 kernel: Failed to create system directory nfs Feb 9 10:28:43.894534 kernel: Failed to create system directory nfs Feb 9 10:28:43.894551 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.895330 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.896524 kernel: Failed to create system directory nfs Feb 9 10:28:43.896547 kernel: Failed to create system directory nfs Feb 9 10:28:43.896561 kernel: Failed to create system directory nfs Feb 9 10:28:43.896575 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.897331 kernel: Failed to create system directory nfs Feb 9 10:28:43.897355 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.898488 kernel: Failed to create system directory nfs Feb 9 10:28:43.898506 kernel: Failed to create system directory nfs Feb 9 10:28:43.898519 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.899679 kernel: Failed to create system directory nfs Feb 9 10:28:43.899711 kernel: Failed to create system directory nfs Feb 9 10:28:43.899731 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.900488 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.901669 kernel: Failed to create system directory nfs Feb 9 10:28:43.901690 kernel: Failed to create system directory nfs Feb 9 10:28:43.901709 kernel: Failed to create system directory nfs Feb 9 10:28:43.901725 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.902477 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.903664 kernel: Failed to create system directory nfs Feb 9 10:28:43.903680 kernel: Failed to create system directory nfs Feb 9 10:28:43.903698 kernel: Failed to create system directory nfs Feb 9 10:28:43.903717 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.904473 kernel: Failed to create system directory nfs Feb 9 10:28:43.904531 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.905663 kernel: Failed to create system directory nfs Feb 9 10:28:43.905680 kernel: Failed to create system directory nfs Feb 9 10:28:43.905698 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.906459 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.907633 kernel: Failed to create system directory nfs Feb 9 10:28:43.907649 kernel: Failed to create system directory nfs Feb 9 10:28:43.907667 kernel: Failed to create system directory nfs Feb 9 10:28:43.907682 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.908435 kernel: Failed to create system directory nfs Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.880000 audit[3391]: AVC avc: denied { confidentiality } for pid=3391 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.909348 kernel: Failed to create system directory nfs Feb 9 10:28:43.909384 kernel: Failed to create system directory nfs Feb 9 10:28:43.918331 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 10:28:43.880000 audit[3391]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad4631b40 a1=ae35c a2=aaaad11ee028 a3=aaaad4297010 items=0 ppid=9 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:43.880000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.943495 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.943532 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.944534 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.944563 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.945533 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.945560 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.946550 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.946581 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.947595 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.947623 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.948597 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.948625 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.949601 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.949630 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.950598 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.950626 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.951590 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.951628 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.952613 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.952651 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.953624 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.953658 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.954627 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.954654 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.955628 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.955662 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.956652 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.956680 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.957695 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.957731 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.958694 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.958728 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.959694 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.959729 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.960710 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.960740 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.961701 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.961734 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.962697 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.962740 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.963739 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.963770 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.964759 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.964787 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.965328 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.966328 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.966359 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.967342 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.967367 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.968345 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.968363 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.969354 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.969374 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.970361 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.970378 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.971359 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.971377 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.972346 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.972372 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.973356 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.973374 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.974351 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.974368 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.975330 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.975349 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.976353 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.976372 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.977356 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.977382 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.978358 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.978375 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.979351 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.979368 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.980349 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.980377 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.981359 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.981385 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.982328 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.982355 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.983356 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.983380 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.984346 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.984363 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.984385 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.985632 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.985654 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.985677 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.986453 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.986470 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.987667 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.987684 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.987698 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.988473 kernel: Failed to create system directory nfs4 Feb 9 10:28:43.935000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:43.989336 kernel: Failed to create system directory nfs4 Feb 9 10:28:44.093357 kernel: NFS: Registering the id_resolver key type Feb 9 10:28:44.093430 kernel: Key type id_resolver registered Feb 9 10:28:44.093449 kernel: Key type id_legacy registered Feb 9 10:28:43.935000 audit[3396]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff865db010 a1=167c04 a2=aaaac9bfe028 a3=aaaaea666010 items=0 ppid=9 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:43.935000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.106610 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.106648 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.106667 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.107473 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.108324 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.108350 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.108373 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.109574 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.109596 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.109609 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.110405 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.110427 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.111611 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.111629 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.111643 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.112413 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.112432 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.113630 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.113647 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.113660 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.114431 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.114456 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.115647 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.115663 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.115682 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.102000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:28:44.116445 kernel: Failed to create system directory rpcgss Feb 9 10:28:44.102000 audit[3398]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa8e93010 a1=3e09c a2=aaaacddde028 a3=aaaae8380010 items=0 ppid=9 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.102000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 10:28:44.121652 kubelet[1443]: E0209 10:28:44.121626 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:44.132579 nfsidmap[3407]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 10:28:44.137190 nfsidmap[3410]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 10:28:44.153000 audit[1203]: AVC avc: denied { watch_reads } for pid=1203 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:28:44.153000 audit[1203]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae76a03f0 a2=10 a3=0 items=0 ppid=1 pid=1203 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.153000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 10:28:44.153000 audit[1203]: AVC avc: denied { watch_reads } for pid=1203 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:28:44.153000 audit[1203]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae76a03f0 a2=10 a3=0 items=0 ppid=1 pid=1203 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.153000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 10:28:44.153000 audit[1203]: AVC avc: denied { watch_reads } for pid=1203 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:28:44.153000 audit[1203]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae76a03f0 a2=10 a3=0 items=0 ppid=1 pid=1203 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.153000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 10:28:44.153000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:28:44.153000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:28:44.153000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:28:44.452771 env[1142]: time="2024-02-09T10:28:44.452721188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:74a0ee30-9a75-45e1-a80c-71e32312e8ee,Namespace:default,Attempt:0,}" Feb 9 10:28:44.554648 systemd-networkd[1043]: cali5ec59c6bf6e: Link UP Feb 9 10:28:44.556545 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:28:44.556608 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 10:28:44.556617 systemd-networkd[1043]: cali5ec59c6bf6e: Gained carrier Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.494 [INFO][3414] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-test--pod--1-eth0 default 74a0ee30-9a75-45e1-a80c-71e32312e8ee 1139 0 2024-02-09 10:28:29 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.4 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.494 [INFO][3414] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.515 [INFO][3427] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" HandleID="k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Workload="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.528 [INFO][3427] ipam_plugin.go 268: Auto assigning IP ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" HandleID="k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Workload="10.0.0.4-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029f120), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"test-pod-1", "timestamp":"2024-02-09 10:28:44.515035559 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.528 [INFO][3427] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.528 [INFO][3427] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.528 [INFO][3427] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.530 [INFO][3427] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.533 [INFO][3427] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.536 [INFO][3427] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.538 [INFO][3427] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.540 [INFO][3427] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.540 [INFO][3427] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.541 [INFO][3427] ipam.go 1682: Creating new handle: k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.544 [INFO][3427] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.549 [INFO][3427] ipam.go 1216: Successfully claimed IPs: [192.168.99.197/26] block=192.168.99.192/26 handle="k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.549 [INFO][3427] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.197/26] handle="k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" host="10.0.0.4" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.549 [INFO][3427] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.549 [INFO][3427] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.197/26] IPv6=[] ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" HandleID="k8s-pod-network.eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Workload="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.552 [INFO][3414] k8s.go 385: Populated endpoint ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"74a0ee30-9a75-45e1-a80c-71e32312e8ee", ResourceVersion:"1139", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:44.564505 env[1142]: 2024-02-09 10:28:44.553 [INFO][3414] k8s.go 386: Calico CNI using IPs: [192.168.99.197/32] ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 10:28:44.565236 env[1142]: 2024-02-09 10:28:44.553 [INFO][3414] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 10:28:44.565236 env[1142]: 2024-02-09 10:28:44.555 [INFO][3414] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 10:28:44.565236 env[1142]: 2024-02-09 10:28:44.556 [INFO][3414] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"74a0ee30-9a75-45e1-a80c-71e32312e8ee", ResourceVersion:"1139", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"46:7e:ad:93:1d:0b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:44.565236 env[1142]: 2024-02-09 10:28:44.561 [INFO][3414] k8s.go 491: Wrote updated endpoint to datastore ContainerID="eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 10:28:44.572000 audit[3449]: NETFILTER_CFG table=filter:101 family=2 entries=48 op=nft_register_chain pid=3449 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:44.572000 audit[3449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23120 a0=3 a1=ffffdd283100 a2=0 a3=ffff93ec7fa8 items=0 ppid=2171 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.572000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:44.575466 env[1142]: time="2024-02-09T10:28:44.575405414Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:28:44.575572 env[1142]: time="2024-02-09T10:28:44.575443174Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:28:44.575572 env[1142]: time="2024-02-09T10:28:44.575453414Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:28:44.575791 env[1142]: time="2024-02-09T10:28:44.575746733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d pid=3457 runtime=io.containerd.runc.v2 Feb 9 10:28:44.586053 systemd[1]: Started cri-containerd-eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d.scope. Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit: BPF prog-id=118 op=LOAD Feb 9 10:28:44.645000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.645000 audit[3468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613463323934643739313332303964333762396231356166333965 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613463323934643739313332303964333762396231356166333965 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.646000 audit: BPF prog-id=119 op=LOAD Feb 9 10:28:44.646000 audit[3468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613463323934643739313332303964333762396231356166333965 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.647000 audit: BPF prog-id=120 op=LOAD Feb 9 10:28:44.647000 audit[3468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613463323934643739313332303964333762396231356166333965 Feb 9 10:28:44.648000 audit: BPF prog-id=120 op=UNLOAD Feb 9 10:28:44.648000 audit: BPF prog-id=119 op=UNLOAD Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:44.648000 audit: BPF prog-id=121 op=LOAD Feb 9 10:28:44.648000 audit[3468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613463323934643739313332303964333762396231356166333965 Feb 9 10:28:44.650706 systemd-resolved[1092]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:28:44.668834 env[1142]: time="2024-02-09T10:28:44.668801231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:74a0ee30-9a75-45e1-a80c-71e32312e8ee,Namespace:default,Attempt:0,} returns sandbox id \"eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d\"" Feb 9 10:28:44.670520 env[1142]: time="2024-02-09T10:28:44.670489107Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 10:28:44.946302 env[1142]: time="2024-02-09T10:28:44.946253487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:44.948415 env[1142]: time="2024-02-09T10:28:44.948387722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:44.949843 env[1142]: time="2024-02-09T10:28:44.949820078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:44.951482 env[1142]: time="2024-02-09T10:28:44.951454275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:44.952866 env[1142]: time="2024-02-09T10:28:44.952833231Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 10:28:44.954357 env[1142]: time="2024-02-09T10:28:44.954302428Z" level=info msg="CreateContainer within sandbox \"eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 10:28:44.963009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2102624533.mount: Deactivated successfully. Feb 9 10:28:44.966691 env[1142]: time="2024-02-09T10:28:44.966630918Z" level=info msg="CreateContainer within sandbox \"eaa4c294d7913209d37b9b15af39e4ffb37cb269799b109f7fe78179017f583d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"370706817a8a10de2dbc7f16ff8edfe2f196e8578de436108053d099702f0f4e\"" Feb 9 10:28:44.967223 env[1142]: time="2024-02-09T10:28:44.967199717Z" level=info msg="StartContainer for \"370706817a8a10de2dbc7f16ff8edfe2f196e8578de436108053d099702f0f4e\"" Feb 9 10:28:44.982565 systemd[1]: Started cri-containerd-370706817a8a10de2dbc7f16ff8edfe2f196e8578de436108053d099702f0f4e.scope. Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit: BPF prog-id=122 op=LOAD Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3457 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:45.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303730363831376138613130646532646263376631366666386564 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3457 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:45.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303730363831376138613130646532646263376631366666386564 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit: BPF prog-id=123 op=LOAD Feb 9 10:28:45.004000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3457 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:45.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303730363831376138613130646532646263376631366666386564 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit: BPF prog-id=124 op=LOAD Feb 9 10:28:45.004000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3457 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:45.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303730363831376138613130646532646263376631366666386564 Feb 9 10:28:45.004000 audit: BPF prog-id=124 op=UNLOAD Feb 9 10:28:45.004000 audit: BPF prog-id=123 op=UNLOAD Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:45.004000 audit: BPF prog-id=125 op=LOAD Feb 9 10:28:45.004000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3457 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:45.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303730363831376138613130646532646263376631366666386564 Feb 9 10:28:45.019009 env[1142]: time="2024-02-09T10:28:45.018966394Z" level=info msg="StartContainer for \"370706817a8a10de2dbc7f16ff8edfe2f196e8578de436108053d099702f0f4e\" returns successfully" Feb 9 10:28:45.122638 kubelet[1443]: E0209 10:28:45.122521 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:45.378885 kubelet[1443]: I0209 10:28:45.378791 1443 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.223372020476028e+09 pod.CreationTimestamp="2024-02-09 10:28:29 +0000 UTC" firstStartedPulling="2024-02-09 10:28:44.670132548 +0000 UTC m=+69.844693197" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:28:45.378612231 +0000 UTC m=+70.553172880" watchObservedRunningTime="2024-02-09 10:28:45.378746751 +0000 UTC m=+70.553307400" Feb 9 10:28:45.705502 systemd-networkd[1043]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 10:28:46.123757 kubelet[1443]: E0209 10:28:46.123627 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:46.760202 systemd[1]: run-containerd-runc-k8s.io-34dd06849347f63b84e7631d7b4e537583643ea268380b8051a0867e8c5e822d-runc.CPZuNJ.mount: Deactivated successfully. Feb 9 10:28:47.124848 kubelet[1443]: E0209 10:28:47.124703 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:48.125508 kubelet[1443]: E0209 10:28:48.125471 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:49.125660 kubelet[1443]: E0209 10:28:49.125605 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:50.126147 kubelet[1443]: E0209 10:28:50.126100 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:51.126642 kubelet[1443]: E0209 10:28:51.126601 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:28:52.127260 kubelet[1443]: E0209 10:28:52.127214 1443 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"