Feb 9 18:24:23.739112 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 18:24:23.739131 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024 Feb 9 18:24:23.739139 kernel: efi: EFI v2.70 by EDK II Feb 9 18:24:23.739145 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Feb 9 18:24:23.739207 kernel: random: crng init done Feb 9 18:24:23.739213 kernel: ACPI: Early table checksum verification disabled Feb 9 18:24:23.739219 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Feb 9 18:24:23.739227 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Feb 9 18:24:23.739233 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739238 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739244 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739249 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739291 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739297 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739313 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739320 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739326 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:24:23.739332 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Feb 9 18:24:23.739337 kernel: NUMA: Failed to initialise from firmware Feb 9 18:24:23.739343 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 18:24:23.739349 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Feb 9 18:24:23.739355 kernel: Zone ranges: Feb 9 18:24:23.739361 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 18:24:23.739367 kernel: DMA32 empty Feb 9 18:24:23.739373 kernel: Normal empty Feb 9 18:24:23.739379 kernel: Movable zone start for each node Feb 9 18:24:23.739384 kernel: Early memory node ranges Feb 9 18:24:23.739390 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Feb 9 18:24:23.739396 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Feb 9 18:24:23.739402 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Feb 9 18:24:23.739407 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Feb 9 18:24:23.739413 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Feb 9 18:24:23.739419 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Feb 9 18:24:23.739425 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Feb 9 18:24:23.739430 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 18:24:23.739438 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Feb 9 18:24:23.739443 kernel: psci: probing for conduit method from ACPI. Feb 9 18:24:23.739449 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 18:24:23.739455 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 18:24:23.739460 kernel: psci: Trusted OS migration not required Feb 9 18:24:23.739469 kernel: psci: SMC Calling Convention v1.1 Feb 9 18:24:23.739475 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Feb 9 18:24:23.739482 kernel: ACPI: SRAT not present Feb 9 18:24:23.739489 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 18:24:23.739495 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 18:24:23.739501 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Feb 9 18:24:23.739507 kernel: Detected PIPT I-cache on CPU0 Feb 9 18:24:23.739513 kernel: CPU features: detected: GIC system register CPU interface Feb 9 18:24:23.739519 kernel: CPU features: detected: Hardware dirty bit management Feb 9 18:24:23.739569 kernel: CPU features: detected: Spectre-v4 Feb 9 18:24:23.739576 kernel: CPU features: detected: Spectre-BHB Feb 9 18:24:23.739585 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 18:24:23.739591 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 18:24:23.739597 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 18:24:23.739603 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Feb 9 18:24:23.739609 kernel: Policy zone: DMA Feb 9 18:24:23.739616 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:24:23.739623 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:24:23.739629 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 18:24:23.739635 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:24:23.739641 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:24:23.739647 kernel: Memory: 2459152K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113136K reserved, 0K cma-reserved) Feb 9 18:24:23.739655 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 18:24:23.739661 kernel: trace event string verifier disabled Feb 9 18:24:23.739667 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 18:24:23.739674 kernel: rcu: RCU event tracing is enabled. Feb 9 18:24:23.739680 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 18:24:23.739687 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 18:24:23.739693 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:24:23.739699 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:24:23.739705 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 18:24:23.739711 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 18:24:23.739717 kernel: GICv3: 256 SPIs implemented Feb 9 18:24:23.739730 kernel: GICv3: 0 Extended SPIs implemented Feb 9 18:24:23.739736 kernel: GICv3: Distributor has no Range Selector support Feb 9 18:24:23.739742 kernel: Root IRQ handler: gic_handle_irq Feb 9 18:24:23.739757 kernel: GICv3: 16 PPIs implemented Feb 9 18:24:23.739763 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Feb 9 18:24:23.739769 kernel: ACPI: SRAT not present Feb 9 18:24:23.739775 kernel: ITS [mem 0x08080000-0x0809ffff] Feb 9 18:24:23.739781 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Feb 9 18:24:23.739787 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Feb 9 18:24:23.739793 kernel: GICv3: using LPI property table @0x00000000400d0000 Feb 9 18:24:23.739799 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Feb 9 18:24:23.739805 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:24:23.739813 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 18:24:23.739819 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 18:24:23.739826 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 18:24:23.739832 kernel: arm-pv: using stolen time PV Feb 9 18:24:23.739838 kernel: Console: colour dummy device 80x25 Feb 9 18:24:23.739844 kernel: ACPI: Core revision 20210730 Feb 9 18:24:23.739851 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 18:24:23.739858 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:24:23.739864 kernel: LSM: Security Framework initializing Feb 9 18:24:23.739870 kernel: SELinux: Initializing. Feb 9 18:24:23.739877 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:24:23.739884 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:24:23.739890 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:24:23.739896 kernel: Platform MSI: ITS@0x8080000 domain created Feb 9 18:24:23.739902 kernel: PCI/MSI: ITS@0x8080000 domain created Feb 9 18:24:23.739909 kernel: Remapping and enabling EFI services. Feb 9 18:24:23.739915 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:24:23.739921 kernel: Detected PIPT I-cache on CPU1 Feb 9 18:24:23.739927 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Feb 9 18:24:23.739935 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Feb 9 18:24:23.739941 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:24:23.739947 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 18:24:23.739954 kernel: Detected PIPT I-cache on CPU2 Feb 9 18:24:23.739963 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Feb 9 18:24:23.739970 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Feb 9 18:24:23.739976 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:24:23.739982 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Feb 9 18:24:23.739989 kernel: Detected PIPT I-cache on CPU3 Feb 9 18:24:23.739995 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Feb 9 18:24:23.740002 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Feb 9 18:24:23.740008 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:24:23.740014 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Feb 9 18:24:23.740021 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 18:24:23.740032 kernel: SMP: Total of 4 processors activated. Feb 9 18:24:23.740040 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 18:24:23.740046 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 18:24:23.740053 kernel: CPU features: detected: Common not Private translations Feb 9 18:24:23.740059 kernel: CPU features: detected: CRC32 instructions Feb 9 18:24:23.740066 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 18:24:23.740072 kernel: CPU features: detected: LSE atomic instructions Feb 9 18:24:23.740079 kernel: CPU features: detected: Privileged Access Never Feb 9 18:24:23.740086 kernel: CPU features: detected: RAS Extension Support Feb 9 18:24:23.740093 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Feb 9 18:24:23.740102 kernel: CPU: All CPU(s) started at EL1 Feb 9 18:24:23.740109 kernel: alternatives: patching kernel code Feb 9 18:24:23.740117 kernel: devtmpfs: initialized Feb 9 18:24:23.740123 kernel: KASLR enabled Feb 9 18:24:23.740130 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:24:23.740139 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 18:24:23.740146 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:24:23.740153 kernel: SMBIOS 3.0.0 present. Feb 9 18:24:23.740161 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Feb 9 18:24:23.740168 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:24:23.740175 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 18:24:23.740182 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 18:24:23.740190 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 18:24:23.740196 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:24:23.740203 kernel: audit: type=2000 audit(0.036:1): state=initialized audit_enabled=0 res=1 Feb 9 18:24:23.740210 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:24:23.740217 kernel: cpuidle: using governor menu Feb 9 18:24:23.740224 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 18:24:23.740230 kernel: ASID allocator initialised with 32768 entries Feb 9 18:24:23.740237 kernel: ACPI: bus type PCI registered Feb 9 18:24:23.740243 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:24:23.740251 kernel: Serial: AMBA PL011 UART driver Feb 9 18:24:23.740258 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:24:23.740264 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 18:24:23.740271 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:24:23.740277 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 18:24:23.740284 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:24:23.740291 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 18:24:23.740297 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:24:23.740304 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:24:23.740312 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:24:23.740318 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:24:23.740325 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:24:23.740331 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:24:23.740338 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:24:23.740344 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 18:24:23.740351 kernel: ACPI: Interpreter enabled Feb 9 18:24:23.740358 kernel: ACPI: Using GIC for interrupt routing Feb 9 18:24:23.740364 kernel: ACPI: MCFG table detected, 1 entries Feb 9 18:24:23.740372 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Feb 9 18:24:23.740378 kernel: printk: console [ttyAMA0] enabled Feb 9 18:24:23.740385 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 18:24:23.740512 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 18:24:23.740585 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 9 18:24:23.740732 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 9 18:24:23.740828 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Feb 9 18:24:23.740894 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Feb 9 18:24:23.740903 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Feb 9 18:24:23.740910 kernel: PCI host bridge to bus 0000:00 Feb 9 18:24:23.740977 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Feb 9 18:24:23.741030 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 9 18:24:23.741082 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Feb 9 18:24:23.741141 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 18:24:23.741216 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Feb 9 18:24:23.741286 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 18:24:23.741348 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Feb 9 18:24:23.741408 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Feb 9 18:24:23.741466 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Feb 9 18:24:23.741532 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Feb 9 18:24:23.741593 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Feb 9 18:24:23.741655 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Feb 9 18:24:23.741709 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Feb 9 18:24:23.741783 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 9 18:24:23.741839 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Feb 9 18:24:23.741848 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 9 18:24:23.741855 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 9 18:24:23.741861 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 9 18:24:23.741871 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 9 18:24:23.741877 kernel: iommu: Default domain type: Translated Feb 9 18:24:23.741884 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 18:24:23.741890 kernel: vgaarb: loaded Feb 9 18:24:23.741897 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:24:23.741904 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Feb 9 18:24:23.741910 kernel: PTP clock support registered Feb 9 18:24:23.741917 kernel: Registered efivars operations Feb 9 18:24:23.741923 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 18:24:23.741930 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:24:23.741938 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:24:23.741944 kernel: pnp: PnP ACPI init Feb 9 18:24:23.742018 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Feb 9 18:24:23.742028 kernel: pnp: PnP ACPI: found 1 devices Feb 9 18:24:23.742034 kernel: NET: Registered PF_INET protocol family Feb 9 18:24:23.742041 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 18:24:23.742048 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 18:24:23.742054 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:24:23.742062 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:24:23.742069 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 18:24:23.742076 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 18:24:23.742082 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:24:23.742089 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:24:23.742099 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:24:23.742106 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:24:23.742113 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Feb 9 18:24:23.742121 kernel: kvm [1]: HYP mode not available Feb 9 18:24:23.742127 kernel: Initialise system trusted keyrings Feb 9 18:24:23.742134 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 18:24:23.742141 kernel: Key type asymmetric registered Feb 9 18:24:23.742147 kernel: Asymmetric key parser 'x509' registered Feb 9 18:24:23.742154 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:24:23.742160 kernel: io scheduler mq-deadline registered Feb 9 18:24:23.742167 kernel: io scheduler kyber registered Feb 9 18:24:23.742173 kernel: io scheduler bfq registered Feb 9 18:24:23.742179 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 9 18:24:23.742187 kernel: ACPI: button: Power Button [PWRB] Feb 9 18:24:23.742194 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 9 18:24:23.742259 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Feb 9 18:24:23.742268 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:24:23.742274 kernel: thunder_xcv, ver 1.0 Feb 9 18:24:23.742281 kernel: thunder_bgx, ver 1.0 Feb 9 18:24:23.742287 kernel: nicpf, ver 1.0 Feb 9 18:24:23.742294 kernel: nicvf, ver 1.0 Feb 9 18:24:23.742361 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 18:24:23.742420 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T18:24:23 UTC (1707503063) Feb 9 18:24:23.742429 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 18:24:23.742436 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:24:23.742442 kernel: Segment Routing with IPv6 Feb 9 18:24:23.742449 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:24:23.742455 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:24:23.742462 kernel: Key type dns_resolver registered Feb 9 18:24:23.742468 kernel: registered taskstats version 1 Feb 9 18:24:23.742476 kernel: Loading compiled-in X.509 certificates Feb 9 18:24:23.742483 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9' Feb 9 18:24:23.742490 kernel: Key type .fscrypt registered Feb 9 18:24:23.742496 kernel: Key type fscrypt-provisioning registered Feb 9 18:24:23.742503 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:24:23.742509 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:24:23.742516 kernel: ima: No architecture policies found Feb 9 18:24:23.742522 kernel: Freeing unused kernel memory: 34688K Feb 9 18:24:23.742533 kernel: Run /init as init process Feb 9 18:24:23.742542 kernel: with arguments: Feb 9 18:24:23.742548 kernel: /init Feb 9 18:24:23.742554 kernel: with environment: Feb 9 18:24:23.742560 kernel: HOME=/ Feb 9 18:24:23.742567 kernel: TERM=linux Feb 9 18:24:23.742573 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:24:23.742581 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:24:23.742590 systemd[1]: Detected virtualization kvm. Feb 9 18:24:23.742598 systemd[1]: Detected architecture arm64. Feb 9 18:24:23.742605 systemd[1]: Running in initrd. Feb 9 18:24:23.742612 systemd[1]: No hostname configured, using default hostname. Feb 9 18:24:23.742619 systemd[1]: Hostname set to <localhost>. Feb 9 18:24:23.742626 systemd[1]: Initializing machine ID from VM UUID. Feb 9 18:24:23.742633 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:24:23.742640 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:24:23.742647 systemd[1]: Reached target cryptsetup.target. Feb 9 18:24:23.742655 systemd[1]: Reached target paths.target. Feb 9 18:24:23.742662 systemd[1]: Reached target slices.target. Feb 9 18:24:23.742669 systemd[1]: Reached target swap.target. Feb 9 18:24:23.742676 systemd[1]: Reached target timers.target. Feb 9 18:24:23.742686 systemd[1]: Listening on iscsid.socket. Feb 9 18:24:23.742693 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:24:23.742700 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:24:23.742708 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:24:23.742715 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:24:23.742727 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:24:23.742735 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:24:23.742743 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:24:23.742759 systemd[1]: Reached target sockets.target. Feb 9 18:24:23.742767 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:24:23.742774 systemd[1]: Finished network-cleanup.service. Feb 9 18:24:23.742781 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:24:23.742789 systemd[1]: Starting systemd-journald.service... Feb 9 18:24:23.742796 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:24:23.742804 systemd[1]: Starting systemd-resolved.service... Feb 9 18:24:23.742811 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:24:23.742818 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:24:23.742825 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:24:23.742832 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:24:23.742842 systemd-journald[290]: Journal started Feb 9 18:24:23.742883 systemd-journald[290]: Runtime Journal (/run/log/journal/dafcf8b24b154cbe8c71a837ec0264a9) is 6.0M, max 48.7M, 42.6M free. Feb 9 18:24:23.736427 systemd-modules-load[291]: Inserted module 'overlay' Feb 9 18:24:23.745086 systemd[1]: Started systemd-journald.service. Feb 9 18:24:23.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.745550 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:24:23.750178 kernel: audit: type=1130 audit(1707503063.745:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.750197 kernel: audit: type=1130 audit(1707503063.746:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.747935 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:24:23.757849 kernel: audit: type=1130 audit(1707503063.750:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.757868 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:24:23.757877 kernel: Bridge firewalling registered Feb 9 18:24:23.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.751904 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:24:23.756783 systemd-modules-load[291]: Inserted module 'br_netfilter' Feb 9 18:24:23.766930 kernel: SCSI subsystem initialized Feb 9 18:24:23.773409 systemd-resolved[292]: Positive Trust Anchors: Feb 9 18:24:23.774945 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:24:23.774965 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:24:23.774980 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:24:23.773423 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:24:23.773451 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:24:23.775208 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:24:23.784841 kernel: audit: type=1130 audit(1707503063.781:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.777908 systemd-resolved[292]: Defaulting to hostname 'linux'. Feb 9 18:24:23.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.782101 systemd-modules-load[291]: Inserted module 'dm_multipath' Feb 9 18:24:23.790808 kernel: audit: type=1130 audit(1707503063.784:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.790826 kernel: audit: type=1130 audit(1707503063.787:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.782609 systemd[1]: Started systemd-resolved.service. Feb 9 18:24:23.785525 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:24:23.788434 systemd[1]: Reached target nss-lookup.target. Feb 9 18:24:23.792115 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:24:23.793830 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:24:23.801374 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:24:23.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.804781 kernel: audit: type=1130 audit(1707503063.802:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.805016 dracut-cmdline[311]: dracut-dracut-053 Feb 9 18:24:23.807364 dracut-cmdline[311]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:24:23.868781 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:24:23.875770 kernel: iscsi: registered transport (tcp) Feb 9 18:24:23.889779 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:24:23.889802 kernel: QLogic iSCSI HBA Driver Feb 9 18:24:23.923548 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:24:23.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.925206 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:24:23.927695 kernel: audit: type=1130 audit(1707503063.923:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:23.971784 kernel: raid6: neonx8 gen() 13813 MB/s Feb 9 18:24:23.988786 kernel: raid6: neonx8 xor() 10121 MB/s Feb 9 18:24:24.005762 kernel: raid6: neonx4 gen() 13305 MB/s Feb 9 18:24:24.023842 kernel: raid6: neonx4 xor() 10295 MB/s Feb 9 18:24:24.040774 kernel: raid6: neonx2 gen() 12208 MB/s Feb 9 18:24:24.057761 kernel: raid6: neonx2 xor() 9976 MB/s Feb 9 18:24:24.074761 kernel: raid6: neonx1 gen() 10486 MB/s Feb 9 18:24:24.091778 kernel: raid6: neonx1 xor() 8789 MB/s Feb 9 18:24:24.108768 kernel: raid6: int64x8 gen() 6279 MB/s Feb 9 18:24:24.125766 kernel: raid6: int64x8 xor() 3547 MB/s Feb 9 18:24:24.142762 kernel: raid6: int64x4 gen() 7215 MB/s Feb 9 18:24:24.159765 kernel: raid6: int64x4 xor() 3850 MB/s Feb 9 18:24:24.176770 kernel: raid6: int64x2 gen() 6127 MB/s Feb 9 18:24:24.193765 kernel: raid6: int64x2 xor() 3293 MB/s Feb 9 18:24:24.210763 kernel: raid6: int64x1 gen() 5017 MB/s Feb 9 18:24:24.227968 kernel: raid6: int64x1 xor() 2630 MB/s Feb 9 18:24:24.227988 kernel: raid6: using algorithm neonx8 gen() 13813 MB/s Feb 9 18:24:24.228004 kernel: raid6: .... xor() 10121 MB/s, rmw enabled Feb 9 18:24:24.228020 kernel: raid6: using neon recovery algorithm Feb 9 18:24:24.238993 kernel: xor: measuring software checksum speed Feb 9 18:24:24.239009 kernel: 8regs : 17308 MB/sec Feb 9 18:24:24.239826 kernel: 32regs : 20749 MB/sec Feb 9 18:24:24.240986 kernel: arm64_neon : 28170 MB/sec Feb 9 18:24:24.241011 kernel: xor: using function: arm64_neon (28170 MB/sec) Feb 9 18:24:24.295798 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 18:24:24.306351 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:24:24.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:24.309000 audit: BPF prog-id=7 op=LOAD Feb 9 18:24:24.309000 audit: BPF prog-id=8 op=LOAD Feb 9 18:24:24.309765 kernel: audit: type=1130 audit(1707503064.306:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:24.310007 systemd[1]: Starting systemd-udevd.service... Feb 9 18:24:24.324169 systemd-udevd[492]: Using default interface naming scheme 'v252'. Feb 9 18:24:24.327630 systemd[1]: Started systemd-udevd.service. Feb 9 18:24:24.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:24.329264 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:24:24.341406 dracut-pre-trigger[499]: rd.md=0: removing MD RAID activation Feb 9 18:24:24.368389 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:24:24.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:24.370082 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:24:24.404057 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:24:24.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:24.434786 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 18:24:24.435011 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 18:24:24.435836 kernel: GPT:9289727 != 19775487 Feb 9 18:24:24.435869 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 18:24:24.436883 kernel: GPT:9289727 != 19775487 Feb 9 18:24:24.437941 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 18:24:24.437971 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:24:24.449782 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (552) Feb 9 18:24:24.453176 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:24:24.458574 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:24:24.462067 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:24:24.466760 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:24:24.467774 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:24:24.470590 systemd[1]: Starting disk-uuid.service... Feb 9 18:24:24.477068 disk-uuid[562]: Primary Header is updated. Feb 9 18:24:24.477068 disk-uuid[562]: Secondary Entries is updated. Feb 9 18:24:24.477068 disk-uuid[562]: Secondary Header is updated. Feb 9 18:24:24.480766 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:24:24.491776 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:24:25.498793 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:24:25.500683 disk-uuid[563]: The operation has completed successfully. Feb 9 18:24:25.534108 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:24:25.534203 systemd[1]: Finished disk-uuid.service. Feb 9 18:24:25.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.536053 systemd[1]: Starting verity-setup.service... Feb 9 18:24:25.555771 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 18:24:25.576723 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:24:25.578974 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:24:25.580814 systemd[1]: Finished verity-setup.service. Feb 9 18:24:25.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.627767 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:24:25.628001 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:24:25.628848 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:24:25.629538 systemd[1]: Starting ignition-setup.service... Feb 9 18:24:25.631686 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:24:25.637814 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:24:25.637853 kernel: BTRFS info (device vda6): using free space tree Feb 9 18:24:25.637869 kernel: BTRFS info (device vda6): has skinny extents Feb 9 18:24:25.645824 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:24:25.652060 systemd[1]: Finished ignition-setup.service. Feb 9 18:24:25.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.653868 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:24:25.723552 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:24:25.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.724000 audit: BPF prog-id=9 op=LOAD Feb 9 18:24:25.726183 systemd[1]: Starting systemd-networkd.service... Feb 9 18:24:25.762570 systemd-networkd[740]: lo: Link UP Feb 9 18:24:25.762581 systemd-networkd[740]: lo: Gained carrier Feb 9 18:24:25.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.763088 systemd-networkd[740]: Enumeration completed Feb 9 18:24:25.763275 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:24:25.763397 systemd[1]: Started systemd-networkd.service. Feb 9 18:24:25.764300 systemd[1]: Reached target network.target. Feb 9 18:24:25.764461 systemd-networkd[740]: eth0: Link UP Feb 9 18:24:25.764464 systemd-networkd[740]: eth0: Gained carrier Feb 9 18:24:25.766424 systemd[1]: Starting iscsiuio.service... Feb 9 18:24:25.782325 systemd[1]: Started iscsiuio.service. Feb 9 18:24:25.784034 systemd[1]: Starting iscsid.service... Feb 9 18:24:25.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.788804 iscsid[745]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:24:25.788804 iscsid[745]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Feb 9 18:24:25.788804 iscsid[745]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:24:25.788804 iscsid[745]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:24:25.788804 iscsid[745]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:24:25.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.793399 ignition[643]: Ignition 2.14.0 Feb 9 18:24:25.800515 iscsid[745]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:24:25.795973 systemd[1]: Started iscsid.service. Feb 9 18:24:25.793406 ignition[643]: Stage: fetch-offline Feb 9 18:24:25.797905 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:24:25.793454 ignition[643]: no configs at "/usr/lib/ignition/base.d" Feb 9 18:24:25.799091 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.38/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 18:24:25.793463 ignition[643]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:24:25.793694 ignition[643]: parsed url from cmdline: "" Feb 9 18:24:25.793698 ignition[643]: no config URL provided Feb 9 18:24:25.793702 ignition[643]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:24:25.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.808022 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:24:25.793710 ignition[643]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:24:25.809129 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:24:25.793738 ignition[643]: op(1): [started] loading QEMU firmware config module Feb 9 18:24:25.810362 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:24:25.793743 ignition[643]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 18:24:25.811518 systemd[1]: Reached target remote-fs.target. Feb 9 18:24:25.800744 ignition[643]: op(1): [finished] loading QEMU firmware config module Feb 9 18:24:25.813352 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:24:25.820788 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:24:25.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.834662 ignition[643]: parsing config with SHA512: fc912e4890859a5bce0d0dd6ba9b4943f8d03e1206853601fd8f99c3e2d701ddacb6f8117770caf363a9848a75c8fb9ea00477fbf88a79fd19b5907b08309e35 Feb 9 18:24:25.856876 unknown[643]: fetched base config from "system" Feb 9 18:24:25.856889 unknown[643]: fetched user config from "qemu" Feb 9 18:24:25.857272 ignition[643]: fetch-offline: fetch-offline passed Feb 9 18:24:25.858656 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:24:25.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.857331 ignition[643]: Ignition finished successfully Feb 9 18:24:25.859861 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 18:24:25.860566 systemd[1]: Starting ignition-kargs.service... Feb 9 18:24:25.868744 ignition[762]: Ignition 2.14.0 Feb 9 18:24:25.868785 ignition[762]: Stage: kargs Feb 9 18:24:25.868876 ignition[762]: no configs at "/usr/lib/ignition/base.d" Feb 9 18:24:25.870900 systemd[1]: Finished ignition-kargs.service. Feb 9 18:24:25.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.868886 ignition[762]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:24:25.869622 ignition[762]: kargs: kargs passed Feb 9 18:24:25.872797 systemd[1]: Starting ignition-disks.service... Feb 9 18:24:25.869660 ignition[762]: Ignition finished successfully Feb 9 18:24:25.878637 ignition[768]: Ignition 2.14.0 Feb 9 18:24:25.878647 ignition[768]: Stage: disks Feb 9 18:24:25.878739 ignition[768]: no configs at "/usr/lib/ignition/base.d" Feb 9 18:24:25.878763 ignition[768]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:24:25.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.880228 systemd[1]: Finished ignition-disks.service. Feb 9 18:24:25.879503 ignition[768]: disks: disks passed Feb 9 18:24:25.881266 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:24:25.879541 ignition[768]: Ignition finished successfully Feb 9 18:24:25.882603 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:24:25.883562 systemd[1]: Reached target local-fs.target. Feb 9 18:24:25.884414 systemd[1]: Reached target sysinit.target. Feb 9 18:24:25.885385 systemd[1]: Reached target basic.target. Feb 9 18:24:25.887079 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:24:25.897584 systemd-fsck[776]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 9 18:24:25.901056 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:24:25.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.906147 systemd[1]: Mounting sysroot.mount... Feb 9 18:24:25.911771 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:24:25.912231 systemd[1]: Mounted sysroot.mount. Feb 9 18:24:25.912963 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:24:25.914872 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:24:25.915561 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 18:24:25.915596 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:24:25.915617 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:24:25.917487 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:24:25.919049 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:24:25.923080 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:24:25.927709 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:24:25.931628 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:24:25.935401 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:24:25.959594 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:24:25.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.961110 systemd[1]: Starting ignition-mount.service... Feb 9 18:24:25.962221 systemd[1]: Starting sysroot-boot.service... Feb 9 18:24:25.966768 bash[827]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 18:24:25.976622 ignition[829]: INFO : Ignition 2.14.0 Feb 9 18:24:25.977496 ignition[829]: INFO : Stage: mount Feb 9 18:24:25.978503 systemd[1]: Finished sysroot-boot.service. Feb 9 18:24:25.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.979903 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 18:24:25.979903 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:24:25.981820 ignition[829]: INFO : mount: mount passed Feb 9 18:24:25.981820 ignition[829]: INFO : Ignition finished successfully Feb 9 18:24:25.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:25.981609 systemd[1]: Finished ignition-mount.service. Feb 9 18:24:26.587830 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:24:26.594303 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (837) Feb 9 18:24:26.594329 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:24:26.594339 kernel: BTRFS info (device vda6): using free space tree Feb 9 18:24:26.595212 kernel: BTRFS info (device vda6): has skinny extents Feb 9 18:24:26.597868 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:24:26.599472 systemd[1]: Starting ignition-files.service... Feb 9 18:24:26.614329 ignition[857]: INFO : Ignition 2.14.0 Feb 9 18:24:26.614329 ignition[857]: INFO : Stage: files Feb 9 18:24:26.615863 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 18:24:26.615863 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:24:26.615863 ignition[857]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:24:26.619125 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:24:26.619125 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:24:26.621733 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:24:26.621733 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:24:26.621733 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:24:26.621733 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 18:24:26.621733 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 18:24:26.621164 unknown[857]: wrote ssh authorized keys file for user: core Feb 9 18:24:26.916921 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 18:24:27.162836 ignition[857]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 18:24:27.164834 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 18:24:27.164834 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 18:24:27.164834 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 18:24:27.354789 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 18:24:27.482398 ignition[857]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 18:24:27.484584 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 18:24:27.484584 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:24:27.484584 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 9 18:24:27.599946 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 18:24:27.743469 systemd-networkd[740]: eth0: Gained IPv6LL Feb 9 18:24:27.871583 ignition[857]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 9 18:24:27.873743 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:24:27.873743 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:24:27.873743 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 9 18:24:27.900511 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 18:24:28.762256 ignition[857]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 9 18:24:28.764605 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:24:28.764605 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:24:28.764605 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:24:28.764605 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:24:28.764605 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:24:28.764605 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:24:28.764605 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Feb 9 18:24:28.764605 ignition[857]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 18:24:28.786776 ignition[857]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 18:24:28.786776 ignition[857]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Feb 9 18:24:28.786776 ignition[857]: INFO : files: op(10): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:24:28.786776 ignition[857]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:24:28.786776 ignition[857]: INFO : files: op(11): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:24:28.786776 ignition[857]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:24:28.786776 ignition[857]: INFO : files: op(12): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 18:24:28.786776 ignition[857]: INFO : files: op(12): op(13): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 18:24:28.818006 ignition[857]: INFO : files: op(12): op(13): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 18:24:28.820049 ignition[857]: INFO : files: op(12): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 18:24:28.820049 ignition[857]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:24:28.820049 ignition[857]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:24:28.820049 ignition[857]: INFO : files: files passed Feb 9 18:24:28.820049 ignition[857]: INFO : Ignition finished successfully Feb 9 18:24:28.829412 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 18:24:28.829436 kernel: audit: type=1130 audit(1707503068.823:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.822218 systemd[1]: Finished ignition-files.service. Feb 9 18:24:28.824797 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:24:28.831171 initrd-setup-root-after-ignition[880]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 18:24:28.828223 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:24:28.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.836346 initrd-setup-root-after-ignition[883]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:24:28.837981 kernel: audit: type=1130 audit(1707503068.833:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.828895 systemd[1]: Starting ignition-quench.service... Feb 9 18:24:28.831373 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:24:28.833211 systemd[1]: Reached target ignition-complete.target. Feb 9 18:24:28.837586 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:24:28.845094 kernel: audit: type=1130 audit(1707503068.839:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.845114 kernel: audit: type=1131 audit(1707503068.839:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.838792 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:24:28.838876 systemd[1]: Finished ignition-quench.service. Feb 9 18:24:28.850519 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:24:28.850610 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:24:28.857265 kernel: audit: type=1130 audit(1707503068.853:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.857282 kernel: audit: type=1131 audit(1707503068.853:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.853290 systemd[1]: Reached target initrd-fs.target. Feb 9 18:24:28.857949 systemd[1]: Reached target initrd.target. Feb 9 18:24:28.859187 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:24:28.859847 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:24:28.869250 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:24:28.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.870655 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:24:28.873280 kernel: audit: type=1130 audit(1707503068.869:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.877854 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:24:28.878649 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:24:28.879869 systemd[1]: Stopped target timers.target. Feb 9 18:24:28.880978 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:24:28.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.881073 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:24:28.885191 kernel: audit: type=1131 audit(1707503068.881:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.882157 systemd[1]: Stopped target initrd.target. Feb 9 18:24:28.884799 systemd[1]: Stopped target basic.target. Feb 9 18:24:28.885744 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:24:28.886723 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:24:28.887675 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:24:28.888773 systemd[1]: Stopped target remote-fs.target. Feb 9 18:24:28.889760 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:24:28.890824 systemd[1]: Stopped target sysinit.target. Feb 9 18:24:28.891742 systemd[1]: Stopped target local-fs.target. Feb 9 18:24:28.892705 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:24:28.893955 systemd[1]: Stopped target swap.target. Feb 9 18:24:28.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.895036 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:24:28.899296 kernel: audit: type=1131 audit(1707503068.896:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.895131 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:24:28.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.896206 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:24:28.902996 kernel: audit: type=1131 audit(1707503068.899:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.898684 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:24:28.898823 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:24:28.899856 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:24:28.899944 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:24:28.902631 systemd[1]: Stopped target paths.target. Feb 9 18:24:28.903481 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:24:28.906777 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:24:28.907729 systemd[1]: Stopped target slices.target. Feb 9 18:24:28.908692 systemd[1]: Stopped target sockets.target. Feb 9 18:24:28.909669 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:24:28.909746 systemd[1]: Closed iscsid.socket. Feb 9 18:24:28.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.910584 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:24:28.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.910679 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:24:28.911719 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:24:28.911821 systemd[1]: Stopped ignition-files.service. Feb 9 18:24:28.913340 systemd[1]: Stopping ignition-mount.service... Feb 9 18:24:28.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.914513 systemd[1]: Stopping iscsiuio.service... Feb 9 18:24:28.915388 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:24:28.915542 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:24:28.917180 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:24:28.918255 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:24:28.921573 ignition[897]: INFO : Ignition 2.14.0 Feb 9 18:24:28.921573 ignition[897]: INFO : Stage: umount Feb 9 18:24:28.921573 ignition[897]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 18:24:28.921573 ignition[897]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:24:28.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.918364 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:24:28.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.926854 ignition[897]: INFO : umount: umount passed Feb 9 18:24:28.926854 ignition[897]: INFO : Ignition finished successfully Feb 9 18:24:28.919461 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:24:28.919540 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:24:28.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.921948 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:24:28.922075 systemd[1]: Stopped iscsiuio.service. Feb 9 18:24:28.924869 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:24:28.924948 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:24:28.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.928135 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 18:24:28.928472 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:24:28.928548 systemd[1]: Stopped ignition-mount.service. Feb 9 18:24:28.929939 systemd[1]: Stopped target network.target. Feb 9 18:24:28.931012 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:24:28.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.931049 systemd[1]: Closed iscsiuio.socket. Feb 9 18:24:28.932980 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:24:28.933031 systemd[1]: Stopped ignition-disks.service. Feb 9 18:24:28.934080 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:24:28.934120 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:24:28.936222 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:24:28.936264 systemd[1]: Stopped ignition-setup.service. Feb 9 18:24:28.937612 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:24:28.939937 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:24:28.947687 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:24:28.947812 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:24:28.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.951810 systemd-networkd[740]: eth0: DHCPv6 lease lost Feb 9 18:24:28.952960 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:24:28.953000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:24:28.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.953054 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:24:28.955012 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:24:28.955044 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:24:28.957028 systemd[1]: Stopping network-cleanup.service... Feb 9 18:24:28.958000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:24:28.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.958028 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:24:28.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.958086 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:24:28.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.959435 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:24:28.959478 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:24:28.963427 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:24:28.963470 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:24:28.964850 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:24:28.970007 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 18:24:28.972265 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:24:28.972374 systemd[1]: Stopped network-cleanup.service. Feb 9 18:24:28.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.975542 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:24:28.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.975669 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:24:28.976771 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:24:28.976808 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:24:28.977888 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:24:28.977922 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:24:28.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.979735 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:24:28.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.979847 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:24:28.982971 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:24:28.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.983018 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:24:28.983848 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:24:28.983887 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:24:28.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:28.986518 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:24:28.987529 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:24:28.987581 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:24:28.991868 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:24:28.991955 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:24:29.002122 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:24:29.002212 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:24:29.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:29.003622 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:24:29.004642 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:24:29.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:29.004689 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:24:29.006549 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:24:29.012951 systemd[1]: Switching root. Feb 9 18:24:29.025984 iscsid[745]: iscsid shutting down. Feb 9 18:24:29.026480 systemd-journald[290]: Journal stopped Feb 9 18:24:31.130946 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Feb 9 18:24:31.131006 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:24:31.131019 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:24:31.131029 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:24:31.131039 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:24:31.131054 kernel: SELinux: policy capability open_perms=1 Feb 9 18:24:31.131064 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:24:31.131074 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:24:31.131083 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:24:31.131093 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:24:31.131103 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:24:31.131112 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:24:31.131123 systemd[1]: Successfully loaded SELinux policy in 35.667ms. Feb 9 18:24:31.131139 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.879ms. Feb 9 18:24:31.131153 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:24:31.131164 systemd[1]: Detected virtualization kvm. Feb 9 18:24:31.131174 systemd[1]: Detected architecture arm64. Feb 9 18:24:31.131185 systemd[1]: Detected first boot. Feb 9 18:24:31.131196 systemd[1]: Initializing machine ID from VM UUID. Feb 9 18:24:31.131207 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:24:31.131217 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:24:31.131228 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:24:31.131239 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:24:31.131251 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:24:31.131262 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:24:31.131273 systemd[1]: Stopped iscsid.service. Feb 9 18:24:31.131284 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:24:31.131294 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:24:31.131305 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:24:31.131316 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:24:31.131327 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:24:31.131337 systemd[1]: Created slice system-getty.slice. Feb 9 18:24:31.131348 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:24:31.131358 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:24:31.131370 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:24:31.131380 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:24:31.131390 systemd[1]: Created slice user.slice. Feb 9 18:24:31.131401 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:24:31.131412 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:24:31.131422 systemd[1]: Set up automount boot.automount. Feb 9 18:24:31.131433 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:24:31.131443 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:24:31.131455 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:24:31.131465 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:24:31.131475 systemd[1]: Reached target integritysetup.target. Feb 9 18:24:31.131486 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:24:31.131496 systemd[1]: Reached target remote-fs.target. Feb 9 18:24:31.131506 systemd[1]: Reached target slices.target. Feb 9 18:24:31.131517 systemd[1]: Reached target swap.target. Feb 9 18:24:31.131527 systemd[1]: Reached target torcx.target. Feb 9 18:24:31.131538 systemd[1]: Reached target veritysetup.target. Feb 9 18:24:31.131549 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:24:31.131560 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:24:31.131573 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:24:31.131584 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:24:31.131594 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:24:31.131605 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:24:31.131615 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:24:31.131626 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:24:31.131636 systemd[1]: Mounting media.mount... Feb 9 18:24:31.131647 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:24:31.131658 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:24:31.131668 systemd[1]: Mounting tmp.mount... Feb 9 18:24:31.131681 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:24:31.131692 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:24:31.131707 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:24:31.131719 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:24:31.131729 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:24:31.131740 systemd[1]: Starting modprobe@drm.service... Feb 9 18:24:31.131756 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:24:31.131768 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:24:31.131779 systemd[1]: Starting modprobe@loop.service... Feb 9 18:24:31.131789 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:24:31.131801 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:24:31.131811 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:24:31.131821 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:24:31.131831 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:24:31.131842 systemd[1]: Stopped systemd-journald.service. Feb 9 18:24:31.131853 kernel: fuse: init (API version 7.34) Feb 9 18:24:31.131864 kernel: loop: module loaded Feb 9 18:24:31.131875 systemd[1]: Starting systemd-journald.service... Feb 9 18:24:31.131887 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:24:31.131898 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:24:31.131908 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:24:31.131919 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:24:31.131929 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:24:31.131940 systemd[1]: Stopped verity-setup.service. Feb 9 18:24:31.131951 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:24:31.131961 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:24:31.131970 systemd[1]: Mounted media.mount. Feb 9 18:24:31.131982 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:24:31.131992 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:24:31.132002 systemd[1]: Mounted tmp.mount. Feb 9 18:24:31.132013 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:24:31.132023 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:24:31.132033 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:24:31.132043 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:24:31.132056 systemd-journald[991]: Journal started Feb 9 18:24:31.132099 systemd-journald[991]: Runtime Journal (/run/log/journal/dafcf8b24b154cbe8c71a837ec0264a9) is 6.0M, max 48.7M, 42.6M free. Feb 9 18:24:29.091000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:24:29.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:24:29.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:24:29.256000 audit: BPF prog-id=10 op=LOAD Feb 9 18:24:29.256000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:24:29.256000 audit: BPF prog-id=11 op=LOAD Feb 9 18:24:29.256000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:24:29.292000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:24:29.292000 audit[929]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458d4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:29.292000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:24:29.293000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:24:29.293000 audit[929]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001459b9 a2=1ed a3=0 items=2 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:29.293000 audit: CWD cwd="/" Feb 9 18:24:29.293000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:29.293000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:29.293000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:24:30.992000 audit: BPF prog-id=12 op=LOAD Feb 9 18:24:30.992000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:24:30.992000 audit: BPF prog-id=13 op=LOAD Feb 9 18:24:30.992000 audit: BPF prog-id=14 op=LOAD Feb 9 18:24:30.992000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:24:30.992000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:24:30.993000 audit: BPF prog-id=15 op=LOAD Feb 9 18:24:30.993000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:24:30.993000 audit: BPF prog-id=16 op=LOAD Feb 9 18:24:30.993000 audit: BPF prog-id=17 op=LOAD Feb 9 18:24:30.993000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:24:30.993000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:24:30.994000 audit: BPF prog-id=18 op=LOAD Feb 9 18:24:30.994000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:24:30.994000 audit: BPF prog-id=19 op=LOAD Feb 9 18:24:30.994000 audit: BPF prog-id=20 op=LOAD Feb 9 18:24:30.994000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:24:30.994000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:24:30.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:30.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:30.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:30.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.004000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:24:31.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.100000 audit: BPF prog-id=21 op=LOAD Feb 9 18:24:31.101000 audit: BPF prog-id=22 op=LOAD Feb 9 18:24:31.101000 audit: BPF prog-id=23 op=LOAD Feb 9 18:24:31.101000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:24:31.101000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:24:31.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.133129 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:24:31.129000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:24:31.129000 audit[991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffd4a81ce0 a2=4000 a3=1 items=0 ppid=1 pid=991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:31.129000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:24:31.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:30.992014 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:24:29.291160 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:24:30.992028 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 18:24:29.291506 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:24:30.995794 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:24:29.291524 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:24:29.291552 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:24:29.291561 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:24:31.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:29.291589 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:24:29.291602 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:24:29.291816 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:24:29.291852 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:24:29.291865 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:24:29.292431 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:24:29.292466 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:24:29.292485 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:24:29.292499 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:24:29.292516 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:24:29.292530 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:24:30.737532 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:30Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:24:30.737810 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:30Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:24:31.135126 systemd[1]: Started systemd-journald.service. Feb 9 18:24:30.737904 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:30Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:24:30.738053 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:30Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:24:30.738101 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:30Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:24:30.738154 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T18:24:30Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:24:31.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.135949 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:24:31.136107 systemd[1]: Finished modprobe@drm.service. Feb 9 18:24:31.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.137167 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:24:31.137312 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:24:31.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.138439 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:24:31.138584 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:24:31.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.139683 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:24:31.139839 systemd[1]: Finished modprobe@loop.service. Feb 9 18:24:31.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.140901 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:24:31.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.142004 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:24:31.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.143207 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:24:31.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.144439 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:24:31.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.145697 systemd[1]: Reached target network-pre.target. Feb 9 18:24:31.147844 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:24:31.149592 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:24:31.150330 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:24:31.151947 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:24:31.154037 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:24:31.154844 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:24:31.155935 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:24:31.156885 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:24:31.157895 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:24:31.159631 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:24:31.163243 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:24:31.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.164277 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:24:31.165266 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:24:31.167278 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:24:31.176567 systemd-journald[991]: Time spent on flushing to /var/log/journal/dafcf8b24b154cbe8c71a837ec0264a9 is 12.860ms for 1014 entries. Feb 9 18:24:31.176567 systemd-journald[991]: System Journal (/var/log/journal/dafcf8b24b154cbe8c71a837ec0264a9) is 8.0M, max 195.6M, 187.6M free. Feb 9 18:24:31.203451 systemd-journald[991]: Received client request to flush runtime journal. Feb 9 18:24:31.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.176163 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:24:31.204410 udevadm[1029]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 18:24:31.177998 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:24:31.195292 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:24:31.204446 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:24:31.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.215870 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:24:31.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.533772 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:24:31.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.535000 audit: BPF prog-id=24 op=LOAD Feb 9 18:24:31.545000 audit: BPF prog-id=25 op=LOAD Feb 9 18:24:31.545000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:24:31.545000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:24:31.546474 systemd[1]: Starting systemd-udevd.service... Feb 9 18:24:31.563625 systemd-udevd[1032]: Using default interface naming scheme 'v252'. Feb 9 18:24:31.575106 systemd[1]: Started systemd-udevd.service. Feb 9 18:24:31.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.581000 audit: BPF prog-id=26 op=LOAD Feb 9 18:24:31.583260 systemd[1]: Starting systemd-networkd.service... Feb 9 18:24:31.592000 audit: BPF prog-id=27 op=LOAD Feb 9 18:24:31.603000 audit: BPF prog-id=28 op=LOAD Feb 9 18:24:31.603000 audit: BPF prog-id=29 op=LOAD Feb 9 18:24:31.605280 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:24:31.621615 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 18:24:31.633697 systemd[1]: Started systemd-userdbd.service. Feb 9 18:24:31.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.663499 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:24:31.690720 systemd-networkd[1052]: lo: Link UP Feb 9 18:24:31.690728 systemd-networkd[1052]: lo: Gained carrier Feb 9 18:24:31.691080 systemd-networkd[1052]: Enumeration completed Feb 9 18:24:31.691182 systemd[1]: Started systemd-networkd.service. Feb 9 18:24:31.691187 systemd-networkd[1052]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:24:31.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.694052 systemd-networkd[1052]: eth0: Link UP Feb 9 18:24:31.694064 systemd-networkd[1052]: eth0: Gained carrier Feb 9 18:24:31.705249 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:24:31.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.707494 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:24:31.714285 systemd-networkd[1052]: eth0: DHCPv4 address 10.0.0.38/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 18:24:31.716730 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:24:31.754716 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:24:31.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.755659 systemd[1]: Reached target cryptsetup.target. Feb 9 18:24:31.757534 systemd[1]: Starting lvm2-activation.service... Feb 9 18:24:31.761189 lvm[1067]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:24:31.796780 systemd[1]: Finished lvm2-activation.service. Feb 9 18:24:31.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.797828 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:24:31.798645 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:24:31.798678 systemd[1]: Reached target local-fs.target. Feb 9 18:24:31.799513 systemd[1]: Reached target machines.target. Feb 9 18:24:31.801642 systemd[1]: Starting ldconfig.service... Feb 9 18:24:31.802833 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:24:31.802924 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:24:31.804049 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:24:31.806115 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:24:31.808495 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:24:31.810323 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:24:31.810379 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:24:31.811504 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:24:31.812650 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1069 (bootctl) Feb 9 18:24:31.814051 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:24:31.824876 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:24:31.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.883104 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:24:31.907138 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:24:31.916636 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:24:31.918206 systemd-fsck[1078]: fsck.fat 4.2 (2021-01-31) Feb 9 18:24:31.918206 systemd-fsck[1078]: /dev/vda1: 236 files, 113719/258078 clusters Feb 9 18:24:31.920531 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:24:31.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.923907 systemd[1]: Mounting boot.mount... Feb 9 18:24:31.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:31.928175 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:24:31.928734 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:24:31.937623 systemd[1]: Mounted boot.mount. Feb 9 18:24:31.950867 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:24:31.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:32.036896 ldconfig[1068]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:24:32.042460 systemd[1]: Finished ldconfig.service. Feb 9 18:24:32.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:32.051684 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:24:32.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:32.054021 systemd[1]: Starting audit-rules.service... Feb 9 18:24:32.055789 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:24:32.057603 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:24:32.058000 audit: BPF prog-id=30 op=LOAD Feb 9 18:24:32.060411 systemd[1]: Starting systemd-resolved.service... Feb 9 18:24:32.062000 audit: BPF prog-id=31 op=LOAD Feb 9 18:24:32.063626 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:24:32.065583 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:24:32.067042 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:24:32.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:32.068416 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:24:32.069000 audit[1093]: SYSTEM_BOOT pid=1093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:24:32.072941 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:24:32.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:32.084978 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:24:32.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:32.085000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:24:32.085000 audit[1102]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff82e3980 a2=420 a3=0 items=0 ppid=1082 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:32.085000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:24:32.086862 augenrules[1102]: No rules Feb 9 18:24:32.087311 systemd[1]: Starting systemd-update-done.service... Feb 9 18:24:32.088657 systemd[1]: Finished audit-rules.service. Feb 9 18:24:32.093384 systemd[1]: Finished systemd-update-done.service. Feb 9 18:24:32.119722 systemd-resolved[1091]: Positive Trust Anchors: Feb 9 18:24:32.120049 systemd-resolved[1091]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:24:32.120128 systemd-resolved[1091]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:24:32.126030 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:24:32.127103 systemd-timesyncd[1092]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 18:24:32.127183 systemd-timesyncd[1092]: Initial clock synchronization to Fri 2024-02-09 18:24:32.055755 UTC. Feb 9 18:24:32.127239 systemd[1]: Reached target time-set.target. Feb 9 18:24:32.133244 systemd-resolved[1091]: Defaulting to hostname 'linux'. Feb 9 18:24:32.137483 systemd[1]: Started systemd-resolved.service. Feb 9 18:24:32.138182 systemd[1]: Reached target network.target. Feb 9 18:24:32.138771 systemd[1]: Reached target nss-lookup.target. Feb 9 18:24:32.139326 systemd[1]: Reached target sysinit.target. Feb 9 18:24:32.139952 systemd[1]: Started motdgen.path. Feb 9 18:24:32.140478 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:24:32.141437 systemd[1]: Started logrotate.timer. Feb 9 18:24:32.142268 systemd[1]: Started mdadm.timer. Feb 9 18:24:32.142941 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:24:32.143745 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:24:32.143790 systemd[1]: Reached target paths.target. Feb 9 18:24:32.144515 systemd[1]: Reached target timers.target. Feb 9 18:24:32.145623 systemd[1]: Listening on dbus.socket. Feb 9 18:24:32.147366 systemd[1]: Starting docker.socket... Feb 9 18:24:32.150326 systemd[1]: Listening on sshd.socket. Feb 9 18:24:32.151146 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:24:32.151550 systemd[1]: Listening on docker.socket. Feb 9 18:24:32.152397 systemd[1]: Reached target sockets.target. Feb 9 18:24:32.153150 systemd[1]: Reached target basic.target. Feb 9 18:24:32.153917 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:24:32.153945 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:24:32.154906 systemd[1]: Starting containerd.service... Feb 9 18:24:32.156489 systemd[1]: Starting dbus.service... Feb 9 18:24:32.158200 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:24:32.160141 systemd[1]: Starting extend-filesystems.service... Feb 9 18:24:32.161028 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:24:32.162267 systemd[1]: Starting motdgen.service... Feb 9 18:24:32.166219 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:24:32.168867 jq[1113]: false Feb 9 18:24:32.167823 systemd[1]: Starting prepare-critools.service... Feb 9 18:24:32.169389 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:24:32.172214 systemd[1]: Starting sshd-keygen.service... Feb 9 18:24:32.174621 systemd[1]: Starting systemd-logind.service... Feb 9 18:24:32.175582 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:24:32.175639 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:24:32.176070 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:24:32.176731 systemd[1]: Starting update-engine.service... Feb 9 18:24:32.179257 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:24:32.182550 jq[1132]: true Feb 9 18:24:32.181648 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:24:32.181843 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:24:32.183472 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:24:32.183616 systemd[1]: Finished motdgen.service. Feb 9 18:24:32.188604 extend-filesystems[1114]: Found vda Feb 9 18:24:32.188604 extend-filesystems[1114]: Found vda1 Feb 9 18:24:32.188604 extend-filesystems[1114]: Found vda2 Feb 9 18:24:32.188604 extend-filesystems[1114]: Found vda3 Feb 9 18:24:32.188604 extend-filesystems[1114]: Found usr Feb 9 18:24:32.188604 extend-filesystems[1114]: Found vda4 Feb 9 18:24:32.188604 extend-filesystems[1114]: Found vda6 Feb 9 18:24:32.188604 extend-filesystems[1114]: Found vda7 Feb 9 18:24:32.188604 extend-filesystems[1114]: Found vda9 Feb 9 18:24:32.188604 extend-filesystems[1114]: Checking size of /dev/vda9 Feb 9 18:24:32.185637 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:24:32.200256 tar[1134]: ./ Feb 9 18:24:32.200256 tar[1134]: ./loopback Feb 9 18:24:32.185870 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:24:32.200512 jq[1138]: true Feb 9 18:24:32.202615 tar[1135]: crictl Feb 9 18:24:32.213888 dbus-daemon[1112]: [system] SELinux support is enabled Feb 9 18:24:32.214030 systemd[1]: Started dbus.service. Feb 9 18:24:32.216184 systemd-logind[1126]: Watching system buttons on /dev/input/event0 (Power Button) Feb 9 18:24:32.216327 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:24:32.216349 systemd[1]: Reached target system-config.target. Feb 9 18:24:32.216356 systemd-logind[1126]: New seat seat0. Feb 9 18:24:32.217146 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:24:32.217159 systemd[1]: Reached target user-config.target. Feb 9 18:24:32.222186 systemd[1]: Started systemd-logind.service. Feb 9 18:24:32.231642 extend-filesystems[1114]: Resized partition /dev/vda9 Feb 9 18:24:32.258600 extend-filesystems[1161]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 18:24:32.272429 bash[1165]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:24:32.273144 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:24:32.278830 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 18:24:32.280253 tar[1134]: ./bandwidth Feb 9 18:24:32.292152 update_engine[1130]: I0209 18:24:32.291769 1130 main.cc:92] Flatcar Update Engine starting Feb 9 18:24:32.296777 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 18:24:32.299491 systemd[1]: Started update-engine.service. Feb 9 18:24:32.302668 systemd[1]: Started locksmithd.service. Feb 9 18:24:32.317123 extend-filesystems[1161]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 18:24:32.317123 extend-filesystems[1161]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 18:24:32.317123 extend-filesystems[1161]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 18:24:32.311137 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:24:32.320581 update_engine[1130]: I0209 18:24:32.308315 1130 update_check_scheduler.cc:74] Next update check in 3m15s Feb 9 18:24:32.320609 env[1139]: time="2024-02-09T18:24:32.309282680Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:24:32.320806 extend-filesystems[1114]: Resized filesystem in /dev/vda9 Feb 9 18:24:32.311289 systemd[1]: Finished extend-filesystems.service. Feb 9 18:24:32.327531 tar[1134]: ./ptp Feb 9 18:24:32.341578 env[1139]: time="2024-02-09T18:24:32.341522240Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:24:32.341709 env[1139]: time="2024-02-09T18:24:32.341681360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:24:32.344934 env[1139]: time="2024-02-09T18:24:32.344891360Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:24:32.344934 env[1139]: time="2024-02-09T18:24:32.344926600Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:24:32.345160 env[1139]: time="2024-02-09T18:24:32.345131560Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:24:32.345160 env[1139]: time="2024-02-09T18:24:32.345154560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:24:32.345219 env[1139]: time="2024-02-09T18:24:32.345167720Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:24:32.345219 env[1139]: time="2024-02-09T18:24:32.345177360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:24:32.345271 env[1139]: time="2024-02-09T18:24:32.345252200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:24:32.345555 env[1139]: time="2024-02-09T18:24:32.345528880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:24:32.345688 env[1139]: time="2024-02-09T18:24:32.345662880Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:24:32.345688 env[1139]: time="2024-02-09T18:24:32.345684080Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:24:32.345785 env[1139]: time="2024-02-09T18:24:32.345764040Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:24:32.345785 env[1139]: time="2024-02-09T18:24:32.345783920Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:24:32.348984 env[1139]: time="2024-02-09T18:24:32.348954160Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:24:32.348984 env[1139]: time="2024-02-09T18:24:32.348985080Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:24:32.349062 env[1139]: time="2024-02-09T18:24:32.348997680Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:24:32.349062 env[1139]: time="2024-02-09T18:24:32.349033040Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.349062 env[1139]: time="2024-02-09T18:24:32.349046240Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.349062 env[1139]: time="2024-02-09T18:24:32.349059400Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.349150 env[1139]: time="2024-02-09T18:24:32.349072320Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.349449 env[1139]: time="2024-02-09T18:24:32.349420360Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.349449 env[1139]: time="2024-02-09T18:24:32.349448520Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.349507 env[1139]: time="2024-02-09T18:24:32.349462200Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.349507 env[1139]: time="2024-02-09T18:24:32.349475760Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.349507 env[1139]: time="2024-02-09T18:24:32.349487120Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:24:32.349612 env[1139]: time="2024-02-09T18:24:32.349591120Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:24:32.349683 env[1139]: time="2024-02-09T18:24:32.349665920Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:24:32.349988 env[1139]: time="2024-02-09T18:24:32.349960880Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:24:32.350030 env[1139]: time="2024-02-09T18:24:32.350000840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350030 env[1139]: time="2024-02-09T18:24:32.350016760Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:24:32.350139 env[1139]: time="2024-02-09T18:24:32.350121280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350139 env[1139]: time="2024-02-09T18:24:32.350138080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350188 env[1139]: time="2024-02-09T18:24:32.350149560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350188 env[1139]: time="2024-02-09T18:24:32.350160120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350236 env[1139]: time="2024-02-09T18:24:32.350220000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350273 env[1139]: time="2024-02-09T18:24:32.350237400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350273 env[1139]: time="2024-02-09T18:24:32.350249680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350273 env[1139]: time="2024-02-09T18:24:32.350261040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350336 env[1139]: time="2024-02-09T18:24:32.350278160Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:24:32.350423 env[1139]: time="2024-02-09T18:24:32.350400840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350456 env[1139]: time="2024-02-09T18:24:32.350423600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350456 env[1139]: time="2024-02-09T18:24:32.350436160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350456 env[1139]: time="2024-02-09T18:24:32.350447320Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:24:32.350516 env[1139]: time="2024-02-09T18:24:32.350460440Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:24:32.350516 env[1139]: time="2024-02-09T18:24:32.350470520Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:24:32.350516 env[1139]: time="2024-02-09T18:24:32.350486160Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:24:32.350572 env[1139]: time="2024-02-09T18:24:32.350518040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:24:32.350768 env[1139]: time="2024-02-09T18:24:32.350698760Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.350776600Z" level=info msg="Connect containerd service" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.350806760Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.351404080Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.351639520Z" level=info msg="Start subscribing containerd event" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.351675840Z" level=info msg="Start recovering state" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.351743640Z" level=info msg="Start event monitor" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.351777480Z" level=info msg="Start snapshots syncer" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.351786680Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.351793800Z" level=info msg="Start streaming server" Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.352195080Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:24:32.353274 env[1139]: time="2024-02-09T18:24:32.352247360Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:24:32.359865 env[1139]: time="2024-02-09T18:24:32.359839080Z" level=info msg="containerd successfully booted in 0.051588s" Feb 9 18:24:32.359917 systemd[1]: Started containerd.service. Feb 9 18:24:32.368486 tar[1134]: ./vlan Feb 9 18:24:32.408153 tar[1134]: ./host-device Feb 9 18:24:32.414277 locksmithd[1167]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:24:32.442212 tar[1134]: ./tuning Feb 9 18:24:32.467792 tar[1134]: ./vrf Feb 9 18:24:32.493787 tar[1134]: ./sbr Feb 9 18:24:32.519231 tar[1134]: ./tap Feb 9 18:24:32.548673 tar[1134]: ./dhcp Feb 9 18:24:32.620711 tar[1134]: ./static Feb 9 18:24:32.641716 tar[1134]: ./firewall Feb 9 18:24:32.654677 systemd[1]: Finished prepare-critools.service. Feb 9 18:24:32.675658 tar[1134]: ./macvlan Feb 9 18:24:32.704714 tar[1134]: ./dummy Feb 9 18:24:32.733301 tar[1134]: ./bridge Feb 9 18:24:32.764384 tar[1134]: ./ipvlan Feb 9 18:24:32.792895 tar[1134]: ./portmap Feb 9 18:24:32.819904 tar[1134]: ./host-local Feb 9 18:24:32.853197 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:24:33.119999 sshd_keygen[1136]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:24:33.136629 systemd[1]: Finished sshd-keygen.service. Feb 9 18:24:33.138854 systemd[1]: Starting issuegen.service... Feb 9 18:24:33.143248 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:24:33.143396 systemd[1]: Finished issuegen.service. Feb 9 18:24:33.145497 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:24:33.153033 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:24:33.155131 systemd[1]: Started getty@tty1.service. Feb 9 18:24:33.157041 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 18:24:33.158106 systemd[1]: Reached target getty.target. Feb 9 18:24:33.158727 systemd[1]: Reached target multi-user.target. Feb 9 18:24:33.160438 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:24:33.166401 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:24:33.166541 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:24:33.167571 systemd[1]: Startup finished in 611ms (kernel) + 5.462s (initrd) + 4.118s (userspace) = 10.192s. Feb 9 18:24:33.246907 systemd-networkd[1052]: eth0: Gained IPv6LL Feb 9 18:24:36.403235 systemd[1]: Created slice system-sshd.slice. Feb 9 18:24:36.404250 systemd[1]: Started sshd@0-10.0.0.38:22-10.0.0.1:45328.service. Feb 9 18:24:36.462385 sshd[1196]: Accepted publickey for core from 10.0.0.1 port 45328 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8 Feb 9 18:24:36.464409 sshd[1196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:24:36.472955 systemd-logind[1126]: New session 1 of user core. Feb 9 18:24:36.473860 systemd[1]: Created slice user-500.slice. Feb 9 18:24:36.474869 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:24:36.482125 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:24:36.483345 systemd[1]: Starting user@500.service... Feb 9 18:24:36.485952 (systemd)[1199]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:24:36.545342 systemd[1199]: Queued start job for default target default.target. Feb 9 18:24:36.545855 systemd[1199]: Reached target paths.target. Feb 9 18:24:36.545874 systemd[1199]: Reached target sockets.target. Feb 9 18:24:36.545885 systemd[1199]: Reached target timers.target. Feb 9 18:24:36.545895 systemd[1199]: Reached target basic.target. Feb 9 18:24:36.545946 systemd[1199]: Reached target default.target. Feb 9 18:24:36.545970 systemd[1199]: Startup finished in 54ms. Feb 9 18:24:36.546071 systemd[1]: Started user@500.service. Feb 9 18:24:36.546984 systemd[1]: Started session-1.scope. Feb 9 18:24:36.597119 systemd[1]: Started sshd@1-10.0.0.38:22-10.0.0.1:45342.service. Feb 9 18:24:36.644350 sshd[1208]: Accepted publickey for core from 10.0.0.1 port 45342 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8 Feb 9 18:24:36.645624 sshd[1208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:24:36.648841 systemd-logind[1126]: New session 2 of user core. Feb 9 18:24:36.649657 systemd[1]: Started session-2.scope. Feb 9 18:24:36.707475 sshd[1208]: pam_unix(sshd:session): session closed for user core Feb 9 18:24:36.711081 systemd[1]: Started sshd@2-10.0.0.38:22-10.0.0.1:45346.service. Feb 9 18:24:36.711608 systemd[1]: sshd@1-10.0.0.38:22-10.0.0.1:45342.service: Deactivated successfully. Feb 9 18:24:36.712330 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 18:24:36.712840 systemd-logind[1126]: Session 2 logged out. Waiting for processes to exit. Feb 9 18:24:36.713569 systemd-logind[1126]: Removed session 2. Feb 9 18:24:36.752082 sshd[1213]: Accepted publickey for core from 10.0.0.1 port 45346 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8 Feb 9 18:24:36.753341 sshd[1213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:24:36.756605 systemd-logind[1126]: New session 3 of user core. Feb 9 18:24:36.757493 systemd[1]: Started session-3.scope. Feb 9 18:24:36.806681 sshd[1213]: pam_unix(sshd:session): session closed for user core Feb 9 18:24:36.809036 systemd[1]: sshd@2-10.0.0.38:22-10.0.0.1:45346.service: Deactivated successfully. Feb 9 18:24:36.809695 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 18:24:36.810554 systemd-logind[1126]: Session 3 logged out. Waiting for processes to exit. Feb 9 18:24:36.814148 systemd[1]: Started sshd@3-10.0.0.38:22-10.0.0.1:45360.service. Feb 9 18:24:36.814586 systemd-logind[1126]: Removed session 3. Feb 9 18:24:36.855275 sshd[1221]: Accepted publickey for core from 10.0.0.1 port 45360 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8 Feb 9 18:24:36.856441 sshd[1221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:24:36.859692 systemd-logind[1126]: New session 4 of user core. Feb 9 18:24:36.860482 systemd[1]: Started session-4.scope. Feb 9 18:24:36.913276 sshd[1221]: pam_unix(sshd:session): session closed for user core Feb 9 18:24:36.915900 systemd[1]: sshd@3-10.0.0.38:22-10.0.0.1:45360.service: Deactivated successfully. Feb 9 18:24:36.916465 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 18:24:36.916980 systemd-logind[1126]: Session 4 logged out. Waiting for processes to exit. Feb 9 18:24:36.918030 systemd[1]: Started sshd@4-10.0.0.38:22-10.0.0.1:45362.service. Feb 9 18:24:36.918686 systemd-logind[1126]: Removed session 4. Feb 9 18:24:36.959828 sshd[1227]: Accepted publickey for core from 10.0.0.1 port 45362 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8 Feb 9 18:24:36.960982 sshd[1227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:24:36.964203 systemd-logind[1126]: New session 5 of user core. Feb 9 18:24:36.965030 systemd[1]: Started session-5.scope. Feb 9 18:24:37.022583 sudo[1230]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 18:24:37.022800 sudo[1230]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:24:37.035605 dbus-daemon[1112]: avc: received setenforce notice (enforcing=1) Feb 9 18:24:37.035770 sudo[1230]: pam_unix(sudo:session): session closed for user root Feb 9 18:24:37.037661 sshd[1227]: pam_unix(sshd:session): session closed for user core Feb 9 18:24:37.041597 systemd[1]: sshd@4-10.0.0.38:22-10.0.0.1:45362.service: Deactivated successfully. Feb 9 18:24:37.042249 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 18:24:37.042850 systemd-logind[1126]: Session 5 logged out. Waiting for processes to exit. Feb 9 18:24:37.043905 systemd[1]: Started sshd@5-10.0.0.38:22-10.0.0.1:45368.service. Feb 9 18:24:37.044536 systemd-logind[1126]: Removed session 5. Feb 9 18:24:37.085293 sshd[1234]: Accepted publickey for core from 10.0.0.1 port 45368 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8 Feb 9 18:24:37.086610 sshd[1234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:24:37.089819 systemd-logind[1126]: New session 6 of user core. Feb 9 18:24:37.090598 systemd[1]: Started session-6.scope. Feb 9 18:24:37.142413 sudo[1238]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 18:24:37.142609 sudo[1238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:24:37.144944 sudo[1238]: pam_unix(sudo:session): session closed for user root Feb 9 18:24:37.149078 sudo[1237]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 18:24:37.149495 sudo[1237]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:24:37.157470 systemd[1]: Stopping audit-rules.service... Feb 9 18:24:37.157000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:24:37.158940 auditctl[1241]: No rules Feb 9 18:24:37.159157 kernel: kauditd_printk_skb: 135 callbacks suppressed Feb 9 18:24:37.159188 kernel: audit: type=1305 audit(1707503077.157:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:24:37.159356 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 18:24:37.159513 systemd[1]: Stopped audit-rules.service. Feb 9 18:24:37.157000 audit[1241]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffee455480 a2=420 a3=0 items=0 ppid=1 pid=1241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:37.160944 systemd[1]: Starting audit-rules.service... Feb 9 18:24:37.162820 kernel: audit: type=1300 audit(1707503077.157:168): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffee455480 a2=420 a3=0 items=0 ppid=1 pid=1241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:37.162868 kernel: audit: type=1327 audit(1707503077.157:168): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:24:37.157000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:24:37.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.165332 kernel: audit: type=1131 audit(1707503077.158:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.176547 augenrules[1258]: No rules Feb 9 18:24:37.177267 systemd[1]: Finished audit-rules.service. Feb 9 18:24:37.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.178600 sudo[1237]: pam_unix(sudo:session): session closed for user root Feb 9 18:24:37.177000 audit[1237]: USER_END pid=1237 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.182299 kernel: audit: type=1130 audit(1707503077.176:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.182359 kernel: audit: type=1106 audit(1707503077.177:171): pid=1237 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.182377 kernel: audit: type=1104 audit(1707503077.177:172): pid=1237 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.177000 audit[1237]: CRED_DISP pid=1237 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.182128 sshd[1234]: pam_unix(sshd:session): session closed for user core Feb 9 18:24:37.185161 systemd[1]: Started sshd@6-10.0.0.38:22-10.0.0.1:45372.service. Feb 9 18:24:37.184000 audit[1234]: USER_END pid=1234 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:37.188695 systemd[1]: sshd@5-10.0.0.38:22-10.0.0.1:45368.service: Deactivated successfully. Feb 9 18:24:37.184000 audit[1234]: CRED_DISP pid=1234 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:37.189359 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 18:24:37.191310 kernel: audit: type=1106 audit(1707503077.184:173): pid=1234 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:37.191374 kernel: audit: type=1104 audit(1707503077.184:174): pid=1234 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:37.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.38:22-10.0.0.1:45372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.193591 kernel: audit: type=1130 audit(1707503077.184:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.38:22-10.0.0.1:45372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.193720 systemd-logind[1126]: Session 6 logged out. Waiting for processes to exit. Feb 9 18:24:37.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.38:22-10.0.0.1:45368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.194525 systemd-logind[1126]: Removed session 6. Feb 9 18:24:37.225000 audit[1263]: USER_ACCT pid=1263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:37.226611 sshd[1263]: Accepted publickey for core from 10.0.0.1 port 45372 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8 Feb 9 18:24:37.227000 audit[1263]: CRED_ACQ pid=1263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:37.227000 audit[1263]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8f6f0b0 a2=3 a3=1 items=0 ppid=1 pid=1263 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:37.227000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:24:37.228916 sshd[1263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:24:37.232487 systemd-logind[1126]: New session 7 of user core. Feb 9 18:24:37.232896 systemd[1]: Started session-7.scope. Feb 9 18:24:37.235000 audit[1263]: USER_START pid=1263 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:37.236000 audit[1266]: CRED_ACQ pid=1266 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:37.282000 audit[1267]: USER_ACCT pid=1267 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.284815 sudo[1267]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 18:24:37.283000 audit[1267]: CRED_REFR pid=1267 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.285015 sudo[1267]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:24:37.285000 audit[1267]: USER_START pid=1267 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:37.812574 systemd[1]: Reloading. Feb 9 18:24:37.864643 /usr/lib/systemd/system-generators/torcx-generator[1297]: time="2024-02-09T18:24:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:24:37.864670 /usr/lib/systemd/system-generators/torcx-generator[1297]: time="2024-02-09T18:24:37Z" level=info msg="torcx already run" Feb 9 18:24:37.921335 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:24:37.921489 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:24:37.937370 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.985000 audit: BPF prog-id=37 op=LOAD Feb 9 18:24:37.985000 audit: BPF prog-id=31 op=UNLOAD Feb 9 18:24:37.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit: BPF prog-id=38 op=LOAD Feb 9 18:24:37.987000 audit: BPF prog-id=35 op=UNLOAD Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit: BPF prog-id=39 op=LOAD Feb 9 18:24:37.988000 audit: BPF prog-id=30 op=UNLOAD Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit: BPF prog-id=40 op=LOAD Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.989000 audit: BPF prog-id=41 op=LOAD Feb 9 18:24:37.989000 audit: BPF prog-id=24 op=UNLOAD Feb 9 18:24:37.989000 audit: BPF prog-id=25 op=UNLOAD Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit: BPF prog-id=42 op=LOAD Feb 9 18:24:37.991000 audit: BPF prog-id=21 op=UNLOAD Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit: BPF prog-id=43 op=LOAD Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.992000 audit: BPF prog-id=44 op=LOAD Feb 9 18:24:37.992000 audit: BPF prog-id=22 op=UNLOAD Feb 9 18:24:37.992000 audit: BPF prog-id=23 op=UNLOAD Feb 9 18:24:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit: BPF prog-id=45 op=LOAD Feb 9 18:24:37.993000 audit: BPF prog-id=27 op=UNLOAD Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.993000 audit: BPF prog-id=46 op=LOAD Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.994000 audit: BPF prog-id=47 op=LOAD Feb 9 18:24:37.994000 audit: BPF prog-id=28 op=UNLOAD Feb 9 18:24:37.994000 audit: BPF prog-id=29 op=UNLOAD Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.996000 audit: BPF prog-id=48 op=LOAD Feb 9 18:24:37.996000 audit: BPF prog-id=32 op=UNLOAD Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit: BPF prog-id=49 op=LOAD Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.997000 audit: BPF prog-id=50 op=LOAD Feb 9 18:24:37.997000 audit: BPF prog-id=33 op=UNLOAD Feb 9 18:24:37.998000 audit: BPF prog-id=34 op=UNLOAD Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:37.999000 audit: BPF prog-id=51 op=LOAD Feb 9 18:24:37.999000 audit: BPF prog-id=26 op=UNLOAD Feb 9 18:24:38.005935 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:24:38.011403 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:24:38.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:38.011837 systemd[1]: Reached target network-online.target. Feb 9 18:24:38.013113 systemd[1]: Started kubelet.service. Feb 9 18:24:38.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:38.022137 systemd[1]: Starting coreos-metadata.service... Feb 9 18:24:38.028497 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 9 18:24:38.028662 systemd[1]: Finished coreos-metadata.service. Feb 9 18:24:38.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:38.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:38.151786 kubelet[1335]: E0209 18:24:38.150237 1335 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 18:24:38.152606 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:24:38.152739 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:24:38.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:24:38.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:38.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:38.323418 systemd[1]: Stopped kubelet.service. Feb 9 18:24:38.339412 systemd[1]: Reloading. Feb 9 18:24:38.388244 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2024-02-09T18:24:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:24:38.388548 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2024-02-09T18:24:38Z" level=info msg="torcx already run" Feb 9 18:24:38.439738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:24:38.440011 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:24:38.455194 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:24:38.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.502000 audit: BPF prog-id=52 op=LOAD Feb 9 18:24:38.502000 audit: BPF prog-id=37 op=UNLOAD Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.504000 audit: BPF prog-id=53 op=LOAD Feb 9 18:24:38.504000 audit: BPF prog-id=38 op=UNLOAD Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.505000 audit: BPF prog-id=54 op=LOAD Feb 9 18:24:38.505000 audit: BPF prog-id=39 op=UNLOAD Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit: BPF prog-id=55 op=LOAD Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.506000 audit: BPF prog-id=56 op=LOAD Feb 9 18:24:38.507000 audit: BPF prog-id=40 op=UNLOAD Feb 9 18:24:38.507000 audit: BPF prog-id=41 op=UNLOAD Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit: BPF prog-id=57 op=LOAD Feb 9 18:24:38.508000 audit: BPF prog-id=42 op=UNLOAD Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit: BPF prog-id=58 op=LOAD Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit: BPF prog-id=59 op=LOAD Feb 9 18:24:38.509000 audit: BPF prog-id=43 op=UNLOAD Feb 9 18:24:38.509000 audit: BPF prog-id=44 op=UNLOAD Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit: BPF prog-id=60 op=LOAD Feb 9 18:24:38.510000 audit: BPF prog-id=45 op=UNLOAD Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit: BPF prog-id=61 op=LOAD Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.511000 audit: BPF prog-id=62 op=LOAD Feb 9 18:24:38.511000 audit: BPF prog-id=46 op=UNLOAD Feb 9 18:24:38.511000 audit: BPF prog-id=47 op=UNLOAD Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit: BPF prog-id=63 op=LOAD Feb 9 18:24:38.513000 audit: BPF prog-id=48 op=UNLOAD Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit: BPF prog-id=64 op=LOAD Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.514000 audit: BPF prog-id=65 op=LOAD Feb 9 18:24:38.514000 audit: BPF prog-id=49 op=UNLOAD Feb 9 18:24:38.514000 audit: BPF prog-id=50 op=UNLOAD Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:38.515000 audit: BPF prog-id=66 op=LOAD Feb 9 18:24:38.515000 audit: BPF prog-id=51 op=UNLOAD Feb 9 18:24:38.526256 systemd[1]: Started kubelet.service. Feb 9 18:24:38.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:38.562800 kubelet[1441]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:24:38.562800 kubelet[1441]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:24:38.562800 kubelet[1441]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:24:38.563106 kubelet[1441]: I0209 18:24:38.562860 1441 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:24:39.098004 kubelet[1441]: I0209 18:24:39.097974 1441 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 18:24:39.098004 kubelet[1441]: I0209 18:24:39.098003 1441 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:24:39.098207 kubelet[1441]: I0209 18:24:39.098192 1441 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 18:24:39.101322 kubelet[1441]: I0209 18:24:39.101307 1441 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:24:39.103374 kubelet[1441]: W0209 18:24:39.103354 1441 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 18:24:39.105157 kubelet[1441]: I0209 18:24:39.105136 1441 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:24:39.105391 kubelet[1441]: I0209 18:24:39.105376 1441 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:24:39.105455 kubelet[1441]: I0209 18:24:39.105442 1441 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:24:39.105543 kubelet[1441]: I0209 18:24:39.105461 1441 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:24:39.105543 kubelet[1441]: I0209 18:24:39.105473 1441 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 18:24:39.105593 kubelet[1441]: I0209 18:24:39.105558 1441 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:24:39.108631 kubelet[1441]: I0209 18:24:39.108614 1441 kubelet.go:405] "Attempting to sync node with API server" Feb 9 18:24:39.108631 kubelet[1441]: I0209 18:24:39.108635 1441 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:24:39.108731 kubelet[1441]: I0209 18:24:39.108656 1441 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:24:39.108731 kubelet[1441]: I0209 18:24:39.108679 1441 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:24:39.108836 kubelet[1441]: E0209 18:24:39.108820 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:39.108884 kubelet[1441]: E0209 18:24:39.108875 1441 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:39.109554 kubelet[1441]: I0209 18:24:39.109524 1441 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:24:39.109935 kubelet[1441]: W0209 18:24:39.109924 1441 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 18:24:39.110529 kubelet[1441]: I0209 18:24:39.110509 1441 server.go:1168] "Started kubelet" Feb 9 18:24:39.111664 kubelet[1441]: E0209 18:24:39.111639 1441 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:24:39.111664 kubelet[1441]: E0209 18:24:39.111674 1441 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:24:39.111789 kubelet[1441]: I0209 18:24:39.111733 1441 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:24:39.112293 kubelet[1441]: I0209 18:24:39.112276 1441 server.go:461] "Adding debug handlers to kubelet server" Feb 9 18:24:39.110000 audit[1441]: AVC avc: denied { mac_admin } for pid=1441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:39.110000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:24:39.110000 audit[1441]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e5ff20 a1=4000e0ced0 a2=4000e5fef0 a3=25 items=0 ppid=1 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.110000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:24:39.111000 audit[1441]: AVC avc: denied { mac_admin } for pid=1441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:39.111000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:24:39.111000 audit[1441]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e27100 a1=4000e0cee8 a2=4000e5ffb0 a3=25 items=0 ppid=1 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.111000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:24:39.113117 kubelet[1441]: I0209 18:24:39.112804 1441 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:24:39.113117 kubelet[1441]: I0209 18:24:39.112840 1441 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:24:39.113117 kubelet[1441]: I0209 18:24:39.112867 1441 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:24:39.113117 kubelet[1441]: I0209 18:24:39.112903 1441 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:24:39.113117 kubelet[1441]: I0209 18:24:39.113086 1441 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 18:24:39.113215 kubelet[1441]: I0209 18:24:39.113163 1441 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 18:24:39.123843 kubelet[1441]: W0209 18:24:39.123819 1441 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:24:39.123961 kubelet[1441]: E0209 18:24:39.123946 1441 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:24:39.124074 kubelet[1441]: E0209 18:24:39.124059 1441 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.38\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 18:24:39.124269 kubelet[1441]: W0209 18:24:39.124252 1441 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.38" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:24:39.124357 kubelet[1441]: E0209 18:24:39.124346 1441 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.38" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:24:39.124670 kubelet[1441]: E0209 18:24:39.124574 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f3443f53", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 110491987, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 110491987, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.125133 kubelet[1441]: W0209 18:24:39.125106 1441 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:24:39.125277 kubelet[1441]: E0209 18:24:39.125264 1441 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:24:39.127897 kubelet[1441]: E0209 18:24:39.127796 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f3560263", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 111656035, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 111656035, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.134660 kubelet[1441]: I0209 18:24:39.134643 1441 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:24:39.134744 kubelet[1441]: I0209 18:24:39.134734 1441 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:24:39.134912 kubelet[1441]: I0209 18:24:39.134900 1441 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:24:39.136198 kubelet[1441]: E0209 18:24:39.136141 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4aba103", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.38 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134044419, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134044419, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.136989 kubelet[1441]: I0209 18:24:39.136930 1441 policy_none.go:49] "None policy: Start" Feb 9 18:24:39.137116 kubelet[1441]: E0209 18:24:39.137055 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4abb427", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.38 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134049319, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134049319, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.137777 kubelet[1441]: I0209 18:24:39.137758 1441 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:24:39.137941 kubelet[1441]: I0209 18:24:39.137929 1441 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:24:39.138013 kubelet[1441]: E0209 18:24:39.137863 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4abc023", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.38 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134052387, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134052387, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.142140 systemd[1]: Created slice kubepods.slice. Feb 9 18:24:39.145439 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 18:24:39.146000 audit[1459]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:39.146000 audit[1459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffbefb750 a2=0 a3=1 items=0 ppid=1441 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:24:39.147000 audit[1461]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:39.147000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffec6624f0 a2=0 a3=1 items=0 ppid=1441 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:24:39.165773 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 18:24:39.167378 kubelet[1441]: I0209 18:24:39.167359 1441 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:24:39.167448 kubelet[1441]: I0209 18:24:39.167418 1441 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:24:39.167608 kubelet[1441]: I0209 18:24:39.167585 1441 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:24:39.166000 audit[1441]: AVC avc: denied { mac_admin } for pid=1441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:39.166000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:24:39.166000 audit[1441]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400113df80 a1=4000d12798 a2=400113df50 a3=25 items=0 ppid=1 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.166000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:24:39.168313 kubelet[1441]: E0209 18:24:39.168298 1441 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.38\" not found" Feb 9 18:24:39.176187 kubelet[1441]: E0209 18:24:39.176117 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f71e8735", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 175128885, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 175128885, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.149000 audit[1463]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:39.149000 audit[1463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff6e567f0 a2=0 a3=1 items=0 ppid=1441 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:24:39.179000 audit[1468]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:39.179000 audit[1468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff8bb9950 a2=0 a3=1 items=0 ppid=1441 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:24:39.204000 audit[1473]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:39.204000 audit[1473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffef62a550 a2=0 a3=1 items=0 ppid=1441 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 18:24:39.206198 kubelet[1441]: I0209 18:24:39.206180 1441 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:24:39.206000 audit[1474]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:39.206000 audit[1474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd4a86c20 a2=0 a3=1 items=0 ppid=1441 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:24:39.207154 kubelet[1441]: I0209 18:24:39.207038 1441 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:24:39.207154 kubelet[1441]: I0209 18:24:39.207064 1441 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 18:24:39.207154 kubelet[1441]: I0209 18:24:39.207084 1441 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 18:24:39.207154 kubelet[1441]: E0209 18:24:39.207123 1441 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 18:24:39.206000 audit[1475]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:39.206000 audit[1475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9c54a70 a2=0 a3=1 items=0 ppid=1441 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:24:39.207000 audit[1476]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:39.207000 audit[1476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef4a0760 a2=0 a3=1 items=0 ppid=1441 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:24:39.208306 kubelet[1441]: W0209 18:24:39.208282 1441 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:24:39.208306 kubelet[1441]: E0209 18:24:39.208306 1441 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:24:39.208000 audit[1477]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:39.208000 audit[1477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffbe09520 a2=0 a3=1 items=0 ppid=1441 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:24:39.208000 audit[1478]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:39.208000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffc0f7690 a2=0 a3=1 items=0 ppid=1441 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:24:39.208000 audit[1479]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:39.208000 audit[1479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffcba87f0 a2=0 a3=1 items=0 ppid=1441 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:24:39.209000 audit[1480]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:39.209000 audit[1480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffda9d1db0 a2=0 a3=1 items=0 ppid=1441 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:39.209000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:24:39.214462 kubelet[1441]: I0209 18:24:39.214442 1441 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.38" Feb 9 18:24:39.215493 kubelet[1441]: E0209 18:24:39.215473 1441 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.38" Feb 9 18:24:39.215869 kubelet[1441]: E0209 18:24:39.215806 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4aba103", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.38 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134044419, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 214399711, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4aba103" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.216768 kubelet[1441]: E0209 18:24:39.216704 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4abb427", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.38 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134049319, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 214404293, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4abb427" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.217578 kubelet[1441]: E0209 18:24:39.217502 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4abc023", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.38 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134052387, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 214406763, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4abc023" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.325831 kubelet[1441]: E0209 18:24:39.325806 1441 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.38\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 18:24:39.416674 kubelet[1441]: I0209 18:24:39.416569 1441 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.38" Feb 9 18:24:39.418159 kubelet[1441]: E0209 18:24:39.418029 1441 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.38" Feb 9 18:24:39.418363 kubelet[1441]: E0209 18:24:39.418271 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4aba103", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.38 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134044419, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 416535593, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4aba103" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.419403 kubelet[1441]: E0209 18:24:39.419346 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4abb427", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.38 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134049319, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 416540653, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4abb427" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.420094 kubelet[1441]: E0209 18:24:39.420041 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4abc023", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.38 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134052387, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 416543402, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4abc023" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.727522 kubelet[1441]: E0209 18:24:39.727427 1441 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.38\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 18:24:39.819560 kubelet[1441]: I0209 18:24:39.819537 1441 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.38" Feb 9 18:24:39.820499 kubelet[1441]: E0209 18:24:39.820480 1441 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.38" Feb 9 18:24:39.820881 kubelet[1441]: E0209 18:24:39.820817 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4aba103", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.38 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134044419, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 819502834, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4aba103" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.821690 kubelet[1441]: E0209 18:24:39.821640 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4abb427", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.38 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134049319, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 819509447, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4abb427" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:39.822374 kubelet[1441]: E0209 18:24:39.822326 1441 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38.17b24500f4abc023", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.38", UID:"10.0.0.38", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.38 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.38"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 134052387, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 24, 39, 819512236, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.38.17b24500f4abc023" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:24:40.071158 kubelet[1441]: W0209 18:24:40.071062 1441 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:24:40.071158 kubelet[1441]: E0209 18:24:40.071097 1441 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:24:40.100255 kubelet[1441]: I0209 18:24:40.100212 1441 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 18:24:40.109444 kubelet[1441]: E0209 18:24:40.109408 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:40.468071 kubelet[1441]: E0209 18:24:40.467981 1441 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.38" not found Feb 9 18:24:40.531638 kubelet[1441]: E0209 18:24:40.531613 1441 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.38\" not found" node="10.0.0.38" Feb 9 18:24:40.621486 kubelet[1441]: I0209 18:24:40.621461 1441 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.38" Feb 9 18:24:40.627219 kubelet[1441]: I0209 18:24:40.627190 1441 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.38" Feb 9 18:24:40.751933 kubelet[1441]: I0209 18:24:40.751842 1441 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 18:24:40.752343 env[1139]: time="2024-02-09T18:24:40.752239132Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 18:24:40.752737 kubelet[1441]: I0209 18:24:40.752722 1441 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 18:24:41.040000 audit[1267]: USER_END pid=1267 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:41.040000 audit[1267]: CRED_DISP pid=1267 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:24:41.042310 sudo[1267]: pam_unix(sudo:session): session closed for user root Feb 9 18:24:41.043697 sshd[1263]: pam_unix(sshd:session): session closed for user core Feb 9 18:24:41.042000 audit[1263]: USER_END pid=1263 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:41.043000 audit[1263]: CRED_DISP pid=1263 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:24:41.046172 systemd[1]: sshd@6-10.0.0.38:22-10.0.0.1:45372.service: Deactivated successfully. Feb 9 18:24:41.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.38:22-10.0.0.1:45372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:24:41.046875 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 18:24:41.047431 systemd-logind[1126]: Session 7 logged out. Waiting for processes to exit. Feb 9 18:24:41.048347 systemd-logind[1126]: Removed session 7. Feb 9 18:24:41.110103 kubelet[1441]: I0209 18:24:41.110070 1441 apiserver.go:52] "Watching apiserver" Feb 9 18:24:41.110381 kubelet[1441]: E0209 18:24:41.110092 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:41.113184 kubelet[1441]: I0209 18:24:41.113155 1441 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:24:41.113370 kubelet[1441]: I0209 18:24:41.113352 1441 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:24:41.113490 kubelet[1441]: I0209 18:24:41.113476 1441 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:24:41.113808 kubelet[1441]: E0209 18:24:41.113653 1441 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwzkj" podUID=d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3 Feb 9 18:24:41.118031 systemd[1]: Created slice kubepods-besteffort-poddc0c47b9_e5a0_4579_b325_ec9661e7009d.slice. Feb 9 18:24:41.123780 kubelet[1441]: I0209 18:24:41.123756 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-lib-modules\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.123909 kubelet[1441]: I0209 18:24:41.123897 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-xtables-lock\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.123982 kubelet[1441]: I0209 18:24:41.123972 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-flexvol-driver-host\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124055 kubelet[1441]: I0209 18:24:41.124046 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-cni-net-dir\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124130 kubelet[1441]: I0209 18:24:41.124120 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-cni-log-dir\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124235 kubelet[1441]: I0209 18:24:41.124224 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-policysync\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124310 kubelet[1441]: I0209 18:24:41.124300 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dc0c47b9-e5a0-4579-b325-ec9661e7009d-tigera-ca-bundle\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124384 kubelet[1441]: I0209 18:24:41.124373 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dc0c47b9-e5a0-4579-b325-ec9661e7009d-node-certs\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124557 kubelet[1441]: I0209 18:24:41.124461 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-var-run-calico\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124557 kubelet[1441]: I0209 18:24:41.124499 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-var-lib-calico\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124557 kubelet[1441]: I0209 18:24:41.124534 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dc0c47b9-e5a0-4579-b325-ec9661e7009d-cni-bin-dir\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.124557 kubelet[1441]: I0209 18:24:41.124572 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d8tzm\" (UniqueName: \"kubernetes.io/projected/dc0c47b9-e5a0-4579-b325-ec9661e7009d-kube-api-access-d8tzm\") pod \"calico-node-vgt5l\" (UID: \"dc0c47b9-e5a0-4579-b325-ec9661e7009d\") " pod="calico-system/calico-node-vgt5l" Feb 9 18:24:41.130584 systemd[1]: Created slice kubepods-besteffort-pod381e419e_f438_4cd7_b45e_cd8529c968fa.slice. Feb 9 18:24:41.213877 kubelet[1441]: I0209 18:24:41.213847 1441 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 18:24:41.225801 kubelet[1441]: I0209 18:24:41.225773 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/381e419e-f438-4cd7-b45e-cd8529c968fa-xtables-lock\") pod \"kube-proxy-w92m8\" (UID: \"381e419e-f438-4cd7-b45e-cd8529c968fa\") " pod="kube-system/kube-proxy-w92m8" Feb 9 18:24:41.225885 kubelet[1441]: I0209 18:24:41.225831 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dhd67\" (UniqueName: \"kubernetes.io/projected/381e419e-f438-4cd7-b45e-cd8529c968fa-kube-api-access-dhd67\") pod \"kube-proxy-w92m8\" (UID: \"381e419e-f438-4cd7-b45e-cd8529c968fa\") " pod="kube-system/kube-proxy-w92m8" Feb 9 18:24:41.225932 kubelet[1441]: I0209 18:24:41.225918 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3-varrun\") pod \"csi-node-driver-lwzkj\" (UID: \"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3\") " pod="calico-system/csi-node-driver-lwzkj" Feb 9 18:24:41.225965 kubelet[1441]: I0209 18:24:41.225948 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3-registration-dir\") pod \"csi-node-driver-lwzkj\" (UID: \"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3\") " pod="calico-system/csi-node-driver-lwzkj" Feb 9 18:24:41.225989 kubelet[1441]: I0209 18:24:41.225972 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/381e419e-f438-4cd7-b45e-cd8529c968fa-kube-proxy\") pod \"kube-proxy-w92m8\" (UID: \"381e419e-f438-4cd7-b45e-cd8529c968fa\") " pod="kube-system/kube-proxy-w92m8" Feb 9 18:24:41.226016 kubelet[1441]: I0209 18:24:41.226003 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3-kubelet-dir\") pod \"csi-node-driver-lwzkj\" (UID: \"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3\") " pod="calico-system/csi-node-driver-lwzkj" Feb 9 18:24:41.226044 kubelet[1441]: I0209 18:24:41.226021 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3-socket-dir\") pod \"csi-node-driver-lwzkj\" (UID: \"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3\") " pod="calico-system/csi-node-driver-lwzkj" Feb 9 18:24:41.226044 kubelet[1441]: I0209 18:24:41.226042 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4g47v\" (UniqueName: \"kubernetes.io/projected/d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3-kube-api-access-4g47v\") pod \"csi-node-driver-lwzkj\" (UID: \"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3\") " pod="calico-system/csi-node-driver-lwzkj" Feb 9 18:24:41.226093 kubelet[1441]: I0209 18:24:41.226060 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/381e419e-f438-4cd7-b45e-cd8529c968fa-lib-modules\") pod \"kube-proxy-w92m8\" (UID: \"381e419e-f438-4cd7-b45e-cd8529c968fa\") " pod="kube-system/kube-proxy-w92m8" Feb 9 18:24:41.226093 kubelet[1441]: I0209 18:24:41.226072 1441 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:24:41.226678 kubelet[1441]: E0209 18:24:41.226649 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.226678 kubelet[1441]: W0209 18:24:41.226669 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.226764 kubelet[1441]: E0209 18:24:41.226692 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.227017 kubelet[1441]: E0209 18:24:41.227000 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.227017 kubelet[1441]: W0209 18:24:41.227016 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.227078 kubelet[1441]: E0209 18:24:41.227037 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.227231 kubelet[1441]: E0209 18:24:41.227219 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.227266 kubelet[1441]: W0209 18:24:41.227230 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.227266 kubelet[1441]: E0209 18:24:41.227247 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.227424 kubelet[1441]: E0209 18:24:41.227413 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.227424 kubelet[1441]: W0209 18:24:41.227422 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.227471 kubelet[1441]: E0209 18:24:41.227437 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.227559 kubelet[1441]: E0209 18:24:41.227550 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.227559 kubelet[1441]: W0209 18:24:41.227559 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.227607 kubelet[1441]: E0209 18:24:41.227572 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.227793 kubelet[1441]: E0209 18:24:41.227778 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.227830 kubelet[1441]: W0209 18:24:41.227794 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.227830 kubelet[1441]: E0209 18:24:41.227814 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.227993 kubelet[1441]: E0209 18:24:41.227981 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.228018 kubelet[1441]: W0209 18:24:41.227993 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.228018 kubelet[1441]: E0209 18:24:41.228015 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.228168 kubelet[1441]: E0209 18:24:41.228157 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.228233 kubelet[1441]: W0209 18:24:41.228168 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.228233 kubelet[1441]: E0209 18:24:41.228184 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.228358 kubelet[1441]: E0209 18:24:41.228346 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.228382 kubelet[1441]: W0209 18:24:41.228358 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.228382 kubelet[1441]: E0209 18:24:41.228375 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.228541 kubelet[1441]: E0209 18:24:41.228529 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.228566 kubelet[1441]: W0209 18:24:41.228541 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.228566 kubelet[1441]: E0209 18:24:41.228562 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.230778 kubelet[1441]: E0209 18:24:41.230403 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.230778 kubelet[1441]: W0209 18:24:41.230419 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.230778 kubelet[1441]: E0209 18:24:41.230434 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.242948 kubelet[1441]: E0209 18:24:41.242918 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.242948 kubelet[1441]: W0209 18:24:41.242936 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.242948 kubelet[1441]: E0209 18:24:41.242954 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.327567 kubelet[1441]: E0209 18:24:41.327470 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.327567 kubelet[1441]: W0209 18:24:41.327492 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.327567 kubelet[1441]: E0209 18:24:41.327512 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.328028 kubelet[1441]: E0209 18:24:41.327708 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.328028 kubelet[1441]: W0209 18:24:41.327866 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.328028 kubelet[1441]: E0209 18:24:41.327957 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.328540 kubelet[1441]: E0209 18:24:41.328419 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.328540 kubelet[1441]: W0209 18:24:41.328464 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.328540 kubelet[1441]: E0209 18:24:41.328484 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.329039 kubelet[1441]: E0209 18:24:41.328949 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.329039 kubelet[1441]: W0209 18:24:41.328968 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.329332 kubelet[1441]: E0209 18:24:41.329134 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.329332 kubelet[1441]: E0209 18:24:41.329289 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.329332 kubelet[1441]: W0209 18:24:41.329303 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.329437 kubelet[1441]: E0209 18:24:41.329403 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.329651 kubelet[1441]: E0209 18:24:41.329530 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.329651 kubelet[1441]: W0209 18:24:41.329542 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.329651 kubelet[1441]: E0209 18:24:41.329579 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.329764 kubelet[1441]: E0209 18:24:41.329722 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.329764 kubelet[1441]: W0209 18:24:41.329731 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.329764 kubelet[1441]: E0209 18:24:41.329763 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.329958 kubelet[1441]: E0209 18:24:41.329944 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.329992 kubelet[1441]: W0209 18:24:41.329958 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.329992 kubelet[1441]: E0209 18:24:41.329978 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.330117 kubelet[1441]: E0209 18:24:41.330108 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.330117 kubelet[1441]: W0209 18:24:41.330117 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.330173 kubelet[1441]: E0209 18:24:41.330130 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.330262 kubelet[1441]: E0209 18:24:41.330254 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.330262 kubelet[1441]: W0209 18:24:41.330262 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.330311 kubelet[1441]: E0209 18:24:41.330275 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.330428 kubelet[1441]: E0209 18:24:41.330420 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.330428 kubelet[1441]: W0209 18:24:41.330428 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.330486 kubelet[1441]: E0209 18:24:41.330441 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.330584 kubelet[1441]: E0209 18:24:41.330574 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.330584 kubelet[1441]: W0209 18:24:41.330584 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.330643 kubelet[1441]: E0209 18:24:41.330598 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.330734 kubelet[1441]: E0209 18:24:41.330726 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.330782 kubelet[1441]: W0209 18:24:41.330735 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.330836 kubelet[1441]: E0209 18:24:41.330821 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.330935 kubelet[1441]: E0209 18:24:41.330926 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.330935 kubelet[1441]: W0209 18:24:41.330935 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.330990 kubelet[1441]: E0209 18:24:41.330955 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.331075 kubelet[1441]: E0209 18:24:41.331066 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.331075 kubelet[1441]: W0209 18:24:41.331075 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.331129 kubelet[1441]: E0209 18:24:41.331111 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.331226 kubelet[1441]: E0209 18:24:41.331217 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.331226 kubelet[1441]: W0209 18:24:41.331226 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.331280 kubelet[1441]: E0209 18:24:41.331246 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.331364 kubelet[1441]: E0209 18:24:41.331355 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.331364 kubelet[1441]: W0209 18:24:41.331364 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.331416 kubelet[1441]: E0209 18:24:41.331378 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.331516 kubelet[1441]: E0209 18:24:41.331506 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.331516 kubelet[1441]: W0209 18:24:41.331516 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.331581 kubelet[1441]: E0209 18:24:41.331530 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.331717 kubelet[1441]: E0209 18:24:41.331707 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.331717 kubelet[1441]: W0209 18:24:41.331717 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.331792 kubelet[1441]: E0209 18:24:41.331731 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.331909 kubelet[1441]: E0209 18:24:41.331898 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.331909 kubelet[1441]: W0209 18:24:41.331909 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.331967 kubelet[1441]: E0209 18:24:41.331924 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.332075 kubelet[1441]: E0209 18:24:41.332065 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.332075 kubelet[1441]: W0209 18:24:41.332075 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.332135 kubelet[1441]: E0209 18:24:41.332088 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.332245 kubelet[1441]: E0209 18:24:41.332233 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.332245 kubelet[1441]: W0209 18:24:41.332242 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.332298 kubelet[1441]: E0209 18:24:41.332280 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.332382 kubelet[1441]: E0209 18:24:41.332371 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.332382 kubelet[1441]: W0209 18:24:41.332381 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.332437 kubelet[1441]: E0209 18:24:41.332415 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.332505 kubelet[1441]: E0209 18:24:41.332494 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.332505 kubelet[1441]: W0209 18:24:41.332503 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.332566 kubelet[1441]: E0209 18:24:41.332538 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.332642 kubelet[1441]: E0209 18:24:41.332633 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.332675 kubelet[1441]: W0209 18:24:41.332642 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.332675 kubelet[1441]: E0209 18:24:41.332666 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.332792 kubelet[1441]: E0209 18:24:41.332782 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.332792 kubelet[1441]: W0209 18:24:41.332792 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.332852 kubelet[1441]: E0209 18:24:41.332807 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.332941 kubelet[1441]: E0209 18:24:41.332932 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.332941 kubelet[1441]: W0209 18:24:41.332941 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.333001 kubelet[1441]: E0209 18:24:41.332967 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.333072 kubelet[1441]: E0209 18:24:41.333064 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.333072 kubelet[1441]: W0209 18:24:41.333072 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.333128 kubelet[1441]: E0209 18:24:41.333092 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.333196 kubelet[1441]: E0209 18:24:41.333188 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.333196 kubelet[1441]: W0209 18:24:41.333196 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.333253 kubelet[1441]: E0209 18:24:41.333215 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.333314 kubelet[1441]: E0209 18:24:41.333305 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.333314 kubelet[1441]: W0209 18:24:41.333314 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.333367 kubelet[1441]: E0209 18:24:41.333327 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.333464 kubelet[1441]: E0209 18:24:41.333456 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.333464 kubelet[1441]: W0209 18:24:41.333464 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.333517 kubelet[1441]: E0209 18:24:41.333477 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.333626 kubelet[1441]: E0209 18:24:41.333617 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.333626 kubelet[1441]: W0209 18:24:41.333626 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.333687 kubelet[1441]: E0209 18:24:41.333646 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.333790 kubelet[1441]: E0209 18:24:41.333779 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.333790 kubelet[1441]: W0209 18:24:41.333789 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.333890 kubelet[1441]: E0209 18:24:41.333873 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.333972 kubelet[1441]: E0209 18:24:41.333927 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.334029 kubelet[1441]: W0209 18:24:41.334017 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.334099 kubelet[1441]: E0209 18:24:41.334083 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.334379 kubelet[1441]: E0209 18:24:41.334363 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.334519 kubelet[1441]: W0209 18:24:41.334503 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.334634 kubelet[1441]: E0209 18:24:41.334609 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.334931 kubelet[1441]: E0209 18:24:41.334876 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.335025 kubelet[1441]: W0209 18:24:41.335010 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.335119 kubelet[1441]: E0209 18:24:41.335098 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.335281 kubelet[1441]: E0209 18:24:41.335268 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.335341 kubelet[1441]: W0209 18:24:41.335330 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.335414 kubelet[1441]: E0209 18:24:41.335400 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.335610 kubelet[1441]: E0209 18:24:41.335596 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.335675 kubelet[1441]: W0209 18:24:41.335664 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.335754 kubelet[1441]: E0209 18:24:41.335731 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.335939 kubelet[1441]: E0209 18:24:41.335926 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.336001 kubelet[1441]: W0209 18:24:41.335990 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.336073 kubelet[1441]: E0209 18:24:41.336059 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.336282 kubelet[1441]: E0209 18:24:41.336269 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.336348 kubelet[1441]: W0209 18:24:41.336336 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.336410 kubelet[1441]: E0209 18:24:41.336399 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.336623 kubelet[1441]: E0209 18:24:41.336606 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.336623 kubelet[1441]: W0209 18:24:41.336618 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.336685 kubelet[1441]: E0209 18:24:41.336634 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.336798 kubelet[1441]: E0209 18:24:41.336788 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.336798 kubelet[1441]: W0209 18:24:41.336797 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.336859 kubelet[1441]: E0209 18:24:41.336812 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.336943 kubelet[1441]: E0209 18:24:41.336932 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.336943 kubelet[1441]: W0209 18:24:41.336942 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.337004 kubelet[1441]: E0209 18:24:41.336955 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.337093 kubelet[1441]: E0209 18:24:41.337082 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.337093 kubelet[1441]: W0209 18:24:41.337091 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.337148 kubelet[1441]: E0209 18:24:41.337104 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.337354 kubelet[1441]: E0209 18:24:41.337340 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.337417 kubelet[1441]: W0209 18:24:41.337406 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.337490 kubelet[1441]: E0209 18:24:41.337479 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.337688 kubelet[1441]: E0209 18:24:41.337672 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.337688 kubelet[1441]: W0209 18:24:41.337683 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.337782 kubelet[1441]: E0209 18:24:41.337695 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.345626 kubelet[1441]: E0209 18:24:41.345597 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.345626 kubelet[1441]: W0209 18:24:41.345615 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.345720 kubelet[1441]: E0209 18:24:41.345638 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.352139 kubelet[1441]: E0209 18:24:41.352114 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:41.352208 kubelet[1441]: W0209 18:24:41.352134 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:41.352208 kubelet[1441]: E0209 18:24:41.352168 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:41.429571 kubelet[1441]: E0209 18:24:41.429535 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:41.430292 env[1139]: time="2024-02-09T18:24:41.430221398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vgt5l,Uid:dc0c47b9-e5a0-4579-b325-ec9661e7009d,Namespace:calico-system,Attempt:0,}" Feb 9 18:24:41.432960 kubelet[1441]: E0209 18:24:41.432923 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:41.433404 env[1139]: time="2024-02-09T18:24:41.433337950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w92m8,Uid:381e419e-f438-4cd7-b45e-cd8529c968fa,Namespace:kube-system,Attempt:0,}" Feb 9 18:24:41.949924 env[1139]: time="2024-02-09T18:24:41.949880820Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:41.951066 env[1139]: time="2024-02-09T18:24:41.951040301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:41.953037 env[1139]: time="2024-02-09T18:24:41.953000443Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:41.954502 env[1139]: time="2024-02-09T18:24:41.954472723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:41.955720 env[1139]: time="2024-02-09T18:24:41.955691023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:41.957472 env[1139]: time="2024-02-09T18:24:41.957440931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:41.958608 env[1139]: time="2024-02-09T18:24:41.958578838Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:41.960728 env[1139]: time="2024-02-09T18:24:41.960699607Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:41.990019 env[1139]: time="2024-02-09T18:24:41.989954077Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:24:41.990019 env[1139]: time="2024-02-09T18:24:41.989991362Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:24:41.990205 env[1139]: time="2024-02-09T18:24:41.990163833Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:24:41.990505 env[1139]: time="2024-02-09T18:24:41.990463872Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd pid=1564 runtime=io.containerd.runc.v2 Feb 9 18:24:41.991906 env[1139]: time="2024-02-09T18:24:41.991847544Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:24:41.992005 env[1139]: time="2024-02-09T18:24:41.991881400Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:24:41.992073 env[1139]: time="2024-02-09T18:24:41.992049045Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:24:41.992341 env[1139]: time="2024-02-09T18:24:41.992308688Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b52d4e6f342a19eaf4e4e5ac497af7c1ef364ccf12f78c337864871bcdd2ca0 pid=1565 runtime=io.containerd.runc.v2 Feb 9 18:24:42.016818 systemd[1]: Started cri-containerd-1b52d4e6f342a19eaf4e4e5ac497af7c1ef364ccf12f78c337864871bcdd2ca0.scope. Feb 9 18:24:42.017635 systemd[1]: Started cri-containerd-a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd.scope. Feb 9 18:24:42.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit: BPF prog-id=67 op=LOAD Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1564 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306337306566356436313436353234636338323833343838613161 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1564 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306337306566356436313436353234636338323833343838613161 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit: BPF prog-id=68 op=LOAD Feb 9 18:24:42.050000 audit[1579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1564 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306337306566356436313436353234636338323833343838613161 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit: BPF prog-id=69 op=LOAD Feb 9 18:24:42.050000 audit[1579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1564 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306337306566356436313436353234636338323833343838613161 Feb 9 18:24:42.050000 audit: BPF prog-id=69 op=UNLOAD Feb 9 18:24:42.050000 audit: BPF prog-id=68 op=UNLOAD Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { perfmon } for pid=1579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1579]: AVC avc: denied { bpf } for pid=1579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit: BPF prog-id=70 op=LOAD Feb 9 18:24:42.050000 audit[1579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1564 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306337306566356436313436353234636338323833343838613161 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit: BPF prog-id=71 op=LOAD Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1565 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353264346536663334326131396561663465346535616334393761 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1565 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353264346536663334326131396561663465346535616334393761 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit: BPF prog-id=72 op=LOAD Feb 9 18:24:42.051000 audit[1584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1565 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353264346536663334326131396561663465346535616334393761 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit: BPF prog-id=73 op=LOAD Feb 9 18:24:42.051000 audit[1584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1565 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353264346536663334326131396561663465346535616334393761 Feb 9 18:24:42.051000 audit: BPF prog-id=73 op=UNLOAD Feb 9 18:24:42.051000 audit: BPF prog-id=72 op=UNLOAD Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:42.051000 audit: BPF prog-id=74 op=LOAD Feb 9 18:24:42.051000 audit[1584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1565 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:42.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353264346536663334326131396561663465346535616334393761 Feb 9 18:24:42.064437 env[1139]: time="2024-02-09T18:24:42.063943941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w92m8,Uid:381e419e-f438-4cd7-b45e-cd8529c968fa,Namespace:kube-system,Attempt:0,} returns sandbox id \"1b52d4e6f342a19eaf4e4e5ac497af7c1ef364ccf12f78c337864871bcdd2ca0\"" Feb 9 18:24:42.064762 kubelet[1441]: E0209 18:24:42.064735 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:42.066006 env[1139]: time="2024-02-09T18:24:42.065970858Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 18:24:42.067070 env[1139]: time="2024-02-09T18:24:42.067019722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vgt5l,Uid:dc0c47b9-e5a0-4579-b325-ec9661e7009d,Namespace:calico-system,Attempt:0,} returns sandbox id \"a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd\"" Feb 9 18:24:42.068210 kubelet[1441]: E0209 18:24:42.068193 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:42.111341 kubelet[1441]: E0209 18:24:42.111294 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:42.233043 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount373314440.mount: Deactivated successfully. Feb 9 18:24:43.050367 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2117484498.mount: Deactivated successfully. Feb 9 18:24:43.111666 kubelet[1441]: E0209 18:24:43.111596 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:43.207985 kubelet[1441]: E0209 18:24:43.207937 1441 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwzkj" podUID=d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3 Feb 9 18:24:43.434036 env[1139]: time="2024-02-09T18:24:43.433937266Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:43.435391 env[1139]: time="2024-02-09T18:24:43.435339891Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:43.436785 env[1139]: time="2024-02-09T18:24:43.436725996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:43.438487 env[1139]: time="2024-02-09T18:24:43.438458646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:43.438988 env[1139]: time="2024-02-09T18:24:43.438957275Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 9 18:24:43.440150 env[1139]: time="2024-02-09T18:24:43.440126209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 18:24:43.441524 env[1139]: time="2024-02-09T18:24:43.441467180Z" level=info msg="CreateContainer within sandbox \"1b52d4e6f342a19eaf4e4e5ac497af7c1ef364ccf12f78c337864871bcdd2ca0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 18:24:43.452612 env[1139]: time="2024-02-09T18:24:43.452562958Z" level=info msg="CreateContainer within sandbox \"1b52d4e6f342a19eaf4e4e5ac497af7c1ef364ccf12f78c337864871bcdd2ca0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4a87942df261125625850b4ac8d1c5812c39763999de39e2198a9531af4a2c22\"" Feb 9 18:24:43.453336 env[1139]: time="2024-02-09T18:24:43.453303499Z" level=info msg="StartContainer for \"4a87942df261125625850b4ac8d1c5812c39763999de39e2198a9531af4a2c22\"" Feb 9 18:24:43.471852 systemd[1]: Started cri-containerd-4a87942df261125625850b4ac8d1c5812c39763999de39e2198a9531af4a2c22.scope. Feb 9 18:24:43.474420 systemd[1]: run-containerd-runc-k8s.io-4a87942df261125625850b4ac8d1c5812c39763999de39e2198a9531af4a2c22-runc.Q7Rv7R.mount: Deactivated successfully. Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.499401 kernel: kauditd_printk_skb: 530 callbacks suppressed Feb 9 18:24:43.499468 kernel: audit: type=1400 audit(1707503083.495:593): avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.499511 kernel: audit: type=1300 audit(1707503083.495:593): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1565 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.495000 audit[1635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1565 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383739343264663236313132353632353835306234616338643163 Feb 9 18:24:43.504522 kernel: audit: type=1327 audit(1707503083.495:593): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383739343264663236313132353632353835306234616338643163 Feb 9 18:24:43.504627 kernel: audit: type=1400 audit(1707503083.495:594): avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.506407 kernel: audit: type=1400 audit(1707503083.495:594): avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.507877 kernel: audit: type=1400 audit(1707503083.495:594): avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.509506 kernel: audit: type=1400 audit(1707503083.495:594): avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.511203 kernel: audit: type=1400 audit(1707503083.495:594): avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.513101 kernel: audit: type=1400 audit(1707503083.495:594): avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.516419 kernel: audit: type=1400 audit(1707503083.495:594): avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit: BPF prog-id=75 op=LOAD Feb 9 18:24:43.495000 audit[1635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1565 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383739343264663236313132353632353835306234616338643163 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.495000 audit: BPF prog-id=76 op=LOAD Feb 9 18:24:43.495000 audit[1635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1565 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383739343264663236313132353632353835306234616338643163 Feb 9 18:24:43.497000 audit: BPF prog-id=76 op=UNLOAD Feb 9 18:24:43.497000 audit: BPF prog-id=75 op=UNLOAD Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { perfmon } for pid=1635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit[1635]: AVC avc: denied { bpf } for pid=1635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:43.497000 audit: BPF prog-id=77 op=LOAD Feb 9 18:24:43.497000 audit[1635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1565 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383739343264663236313132353632353835306234616338643163 Feb 9 18:24:43.520384 env[1139]: time="2024-02-09T18:24:43.520344277Z" level=info msg="StartContainer for \"4a87942df261125625850b4ac8d1c5812c39763999de39e2198a9531af4a2c22\" returns successfully" Feb 9 18:24:43.630000 audit[1686]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.630000 audit[1686]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8e73dc0 a2=0 a3=ffffb7b626c0 items=0 ppid=1647 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:24:43.631000 audit[1687]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.631000 audit[1687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff52fdc90 a2=0 a3=ffff8a85c6c0 items=0 ppid=1647 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:24:43.631000 audit[1689]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.631000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbd3c400 a2=0 a3=ffff994106c0 items=0 ppid=1647 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.631000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:24:43.633000 audit[1690]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.633000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb354270 a2=0 a3=ffff9bf7a6c0 items=0 ppid=1647 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:24:43.633000 audit[1691]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.633000 audit[1691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd71bc3e0 a2=0 a3=ffffa62a26c0 items=0 ppid=1647 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:24:43.634000 audit[1692]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.634000 audit[1692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff88325d0 a2=0 a3=ffff99b9a6c0 items=0 ppid=1647 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:24:43.732000 audit[1693]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.732000 audit[1693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff6b0afb0 a2=0 a3=ffffbe3fc6c0 items=0 ppid=1647 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:24:43.735000 audit[1695]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.735000 audit[1695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd4d2a3e0 a2=0 a3=ffffa00136c0 items=0 ppid=1647 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:24:43.738000 audit[1698]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.738000 audit[1698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff48fc600 a2=0 a3=ffffa507b6c0 items=0 ppid=1647 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:24:43.739000 audit[1699]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.739000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8d5e9e0 a2=0 a3=ffffbf0356c0 items=0 ppid=1647 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:24:43.742000 audit[1701]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.742000 audit[1701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe1deb2f0 a2=0 a3=ffff86bde6c0 items=0 ppid=1647 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:24:43.743000 audit[1702]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.743000 audit[1702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3f3fb50 a2=0 a3=ffffb72cb6c0 items=0 ppid=1647 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:24:43.746000 audit[1704]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.746000 audit[1704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffffe93520 a2=0 a3=ffff88d616c0 items=0 ppid=1647 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:24:43.749000 audit[1707]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.749000 audit[1707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd2593a90 a2=0 a3=ffffa0df36c0 items=0 ppid=1647 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 18:24:43.750000 audit[1708]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.750000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7811430 a2=0 a3=ffffbc89d6c0 items=0 ppid=1647 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:24:43.752000 audit[1710]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.752000 audit[1710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd19176b0 a2=0 a3=ffffaef926c0 items=0 ppid=1647 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:24:43.753000 audit[1711]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.753000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf58fd10 a2=0 a3=ffff8e4506c0 items=0 ppid=1647 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:24:43.756000 audit[1713]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.756000 audit[1713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffbd10970 a2=0 a3=ffffbd4856c0 items=0 ppid=1647 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:24:43.759000 audit[1716]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.759000 audit[1716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc94824e0 a2=0 a3=ffff8278f6c0 items=0 ppid=1647 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:24:43.762000 audit[1719]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.762000 audit[1719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff4168240 a2=0 a3=ffffa424d6c0 items=0 ppid=1647 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:24:43.763000 audit[1720]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.763000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdcb12020 a2=0 a3=ffffa43a26c0 items=0 ppid=1647 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:24:43.765000 audit[1722]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.765000 audit[1722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffc4a9370 a2=0 a3=ffff81b3a6c0 items=0 ppid=1647 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:24:43.795000 audit[1727]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.795000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffebefbd90 a2=0 a3=ffff8a4d76c0 items=0 ppid=1647 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:24:43.800000 audit[1732]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.800000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc82a3490 a2=0 a3=ffff96deb6c0 items=0 ppid=1647 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:24:43.803000 audit[1734]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:24:43.803000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe86844c0 a2=0 a3=ffffb1a746c0 items=0 ppid=1647 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:24:43.813000 audit[1736]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:43.813000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd078f230 a2=0 a3=ffffbdd686c0 items=0 ppid=1647 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:43.824000 audit[1736]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:43.824000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffd078f230 a2=0 a3=ffffbdd686c0 items=0 ppid=1647 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:43.826000 audit[1742]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.826000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff0b47c00 a2=0 a3=ffff936976c0 items=0 ppid=1647 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:24:43.828000 audit[1744]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.828000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdd72ac00 a2=0 a3=ffffbc2c66c0 items=0 ppid=1647 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 18:24:43.831000 audit[1747]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.831000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffcf714f0 a2=0 a3=ffff91cff6c0 items=0 ppid=1647 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 18:24:43.832000 audit[1748]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.832000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4046640 a2=0 a3=ffff8391d6c0 items=0 ppid=1647 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:24:43.835000 audit[1750]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.835000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeb5d8830 a2=0 a3=ffff9fbd06c0 items=0 ppid=1647 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:24:43.836000 audit[1751]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.836000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5eefc80 a2=0 a3=ffff7f9f86c0 items=0 ppid=1647 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:24:43.838000 audit[1753]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.838000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff2c417e0 a2=0 a3=ffff8843b6c0 items=0 ppid=1647 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 18:24:43.842000 audit[1756]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.842000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffcabc8570 a2=0 a3=ffff860a86c0 items=0 ppid=1647 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:24:43.843000 audit[1757]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.843000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffefd42050 a2=0 a3=ffffbd6c26c0 items=0 ppid=1647 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:24:43.845000 audit[1759]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.845000 audit[1759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc8434b80 a2=0 a3=ffff8999d6c0 items=0 ppid=1647 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:24:43.846000 audit[1760]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.846000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd7aff5d0 a2=0 a3=ffffacb746c0 items=0 ppid=1647 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:24:43.849000 audit[1762]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.849000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc4433650 a2=0 a3=ffff8f20a6c0 items=0 ppid=1647 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:24:43.852000 audit[1765]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.852000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5ed6c90 a2=0 a3=ffffaab1a6c0 items=0 ppid=1647 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:24:43.855000 audit[1768]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.855000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffca4916e0 a2=0 a3=ffffa3be86c0 items=0 ppid=1647 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 18:24:43.856000 audit[1769]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.856000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcbfe2930 a2=0 a3=ffffa1ef66c0 items=0 ppid=1647 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:24:43.858000 audit[1771]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.858000 audit[1771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffb6e54a0 a2=0 a3=ffffb3df76c0 items=0 ppid=1647 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:24:43.861000 audit[1774]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.861000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffff55e30 a2=0 a3=ffff914686c0 items=0 ppid=1647 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:24:43.862000 audit[1775]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.862000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2577790 a2=0 a3=ffffbef376c0 items=0 ppid=1647 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:24:43.864000 audit[1777]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.864000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff01ae720 a2=0 a3=ffffa78dc6c0 items=0 ppid=1647 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.864000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:24:43.868000 audit[1780]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.868000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe592bd10 a2=0 a3=ffffa344f6c0 items=0 ppid=1647 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:24:43.869000 audit[1781]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.869000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff63df9e0 a2=0 a3=ffffbdcb86c0 items=0 ppid=1647 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:24:43.871000 audit[1783]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:24:43.871000 audit[1783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcaf6e8b0 a2=0 a3=ffffa253e6c0 items=0 ppid=1647 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:24:43.873000 audit[1785]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:24:43.873000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe6130810 a2=0 a3=ffffb86bb6c0 items=0 ppid=1647 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.873000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:43.874000 audit[1785]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:24:43.874000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffe6130810 a2=0 a3=ffffb86bb6c0 items=0 ppid=1647 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:43.874000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:44.112352 kubelet[1441]: E0209 18:24:44.112229 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:44.217064 kubelet[1441]: E0209 18:24:44.217036 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:44.230082 kubelet[1441]: I0209 18:24:44.230039 1441 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-w92m8" podStartSLOduration=2.856079479 podCreationTimestamp="2024-02-09 18:24:40 +0000 UTC" firstStartedPulling="2024-02-09 18:24:42.065612979 +0000 UTC m=+3.536071282" lastFinishedPulling="2024-02-09 18:24:43.439518038 +0000 UTC m=+4.909976341" observedRunningTime="2024-02-09 18:24:44.229741478 +0000 UTC m=+5.700199741" watchObservedRunningTime="2024-02-09 18:24:44.229984538 +0000 UTC m=+5.700442841" Feb 9 18:24:44.231643 kubelet[1441]: E0209 18:24:44.231616 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.231643 kubelet[1441]: W0209 18:24:44.231637 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.231720 kubelet[1441]: E0209 18:24:44.231654 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.231820 kubelet[1441]: E0209 18:24:44.231798 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.231820 kubelet[1441]: W0209 18:24:44.231811 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.231820 kubelet[1441]: E0209 18:24:44.231822 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.231996 kubelet[1441]: E0209 18:24:44.231961 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.231996 kubelet[1441]: W0209 18:24:44.231982 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.231996 kubelet[1441]: E0209 18:24:44.231994 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.232190 kubelet[1441]: E0209 18:24:44.232164 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.232190 kubelet[1441]: W0209 18:24:44.232179 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.232190 kubelet[1441]: E0209 18:24:44.232190 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.232319 kubelet[1441]: E0209 18:24:44.232309 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.232319 kubelet[1441]: W0209 18:24:44.232318 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.232363 kubelet[1441]: E0209 18:24:44.232327 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.232445 kubelet[1441]: E0209 18:24:44.232435 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.232470 kubelet[1441]: W0209 18:24:44.232445 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.232470 kubelet[1441]: E0209 18:24:44.232454 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.232936 kubelet[1441]: E0209 18:24:44.232914 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.232936 kubelet[1441]: W0209 18:24:44.232929 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.233000 kubelet[1441]: E0209 18:24:44.232941 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.233073 kubelet[1441]: E0209 18:24:44.233062 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.233073 kubelet[1441]: W0209 18:24:44.233072 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.233127 kubelet[1441]: E0209 18:24:44.233081 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.233202 kubelet[1441]: E0209 18:24:44.233191 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.233202 kubelet[1441]: W0209 18:24:44.233200 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.233257 kubelet[1441]: E0209 18:24:44.233209 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.233371 kubelet[1441]: E0209 18:24:44.233360 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.233403 kubelet[1441]: W0209 18:24:44.233371 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.233403 kubelet[1441]: E0209 18:24:44.233380 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.233501 kubelet[1441]: E0209 18:24:44.233491 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.233527 kubelet[1441]: W0209 18:24:44.233501 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.233527 kubelet[1441]: E0209 18:24:44.233510 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.233628 kubelet[1441]: E0209 18:24:44.233619 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.233651 kubelet[1441]: W0209 18:24:44.233627 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.233651 kubelet[1441]: E0209 18:24:44.233636 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.233773 kubelet[1441]: E0209 18:24:44.233763 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.233773 kubelet[1441]: W0209 18:24:44.233773 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.233823 kubelet[1441]: E0209 18:24:44.233782 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.233901 kubelet[1441]: E0209 18:24:44.233891 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.233901 kubelet[1441]: W0209 18:24:44.233900 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.233952 kubelet[1441]: E0209 18:24:44.233909 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.234104 kubelet[1441]: E0209 18:24:44.234090 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.234138 kubelet[1441]: W0209 18:24:44.234106 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.234138 kubelet[1441]: E0209 18:24:44.234117 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.234268 kubelet[1441]: E0209 18:24:44.234258 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.234268 kubelet[1441]: W0209 18:24:44.234267 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.234314 kubelet[1441]: E0209 18:24:44.234277 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.247722 kubelet[1441]: E0209 18:24:44.247700 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.247722 kubelet[1441]: W0209 18:24:44.247717 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.247875 kubelet[1441]: E0209 18:24:44.247732 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.247925 kubelet[1441]: E0209 18:24:44.247912 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.247925 kubelet[1441]: W0209 18:24:44.247922 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.248001 kubelet[1441]: E0209 18:24:44.247948 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.248154 kubelet[1441]: E0209 18:24:44.248139 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.248192 kubelet[1441]: W0209 18:24:44.248155 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.248192 kubelet[1441]: E0209 18:24:44.248178 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.248368 kubelet[1441]: E0209 18:24:44.248358 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.248368 kubelet[1441]: W0209 18:24:44.248368 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.248425 kubelet[1441]: E0209 18:24:44.248381 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.248522 kubelet[1441]: E0209 18:24:44.248511 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.248522 kubelet[1441]: W0209 18:24:44.248521 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.248595 kubelet[1441]: E0209 18:24:44.248583 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.248806 kubelet[1441]: E0209 18:24:44.248794 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.248806 kubelet[1441]: W0209 18:24:44.248805 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.248888 kubelet[1441]: E0209 18:24:44.248820 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.249188 kubelet[1441]: E0209 18:24:44.249173 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.249188 kubelet[1441]: W0209 18:24:44.249187 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.249262 kubelet[1441]: E0209 18:24:44.249207 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.249424 kubelet[1441]: E0209 18:24:44.249409 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.249424 kubelet[1441]: W0209 18:24:44.249421 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.249490 kubelet[1441]: E0209 18:24:44.249437 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.249590 kubelet[1441]: E0209 18:24:44.249576 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.249590 kubelet[1441]: W0209 18:24:44.249585 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.249590 kubelet[1441]: E0209 18:24:44.249596 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.249758 kubelet[1441]: E0209 18:24:44.249730 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.249758 kubelet[1441]: W0209 18:24:44.249739 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.249833 kubelet[1441]: E0209 18:24:44.249813 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.250131 kubelet[1441]: E0209 18:24:44.250106 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.250131 kubelet[1441]: W0209 18:24:44.250119 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.250131 kubelet[1441]: E0209 18:24:44.250136 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.250279 kubelet[1441]: E0209 18:24:44.250266 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:24:44.250279 kubelet[1441]: W0209 18:24:44.250276 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:24:44.250326 kubelet[1441]: E0209 18:24:44.250286 1441 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:24:44.509865 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1954629566.mount: Deactivated successfully. Feb 9 18:24:44.577861 env[1139]: time="2024-02-09T18:24:44.577816538Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:44.580051 env[1139]: time="2024-02-09T18:24:44.580009831Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:44.581177 env[1139]: time="2024-02-09T18:24:44.581137275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:44.582281 env[1139]: time="2024-02-09T18:24:44.582243722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:44.582739 env[1139]: time="2024-02-09T18:24:44.582694276Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 18:24:44.584618 env[1139]: time="2024-02-09T18:24:44.584582077Z" level=info msg="CreateContainer within sandbox \"a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:24:44.593762 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount385666347.mount: Deactivated successfully. Feb 9 18:24:44.597456 env[1139]: time="2024-02-09T18:24:44.597416189Z" level=info msg="CreateContainer within sandbox \"a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"37331e36ee87d02db2179614dcfab434a1e2bcb5856d7006c0e727b73f32c608\"" Feb 9 18:24:44.598025 env[1139]: time="2024-02-09T18:24:44.597946859Z" level=info msg="StartContainer for \"37331e36ee87d02db2179614dcfab434a1e2bcb5856d7006c0e727b73f32c608\"" Feb 9 18:24:44.612689 systemd[1]: Started cri-containerd-37331e36ee87d02db2179614dcfab434a1e2bcb5856d7006c0e727b73f32c608.scope. Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1564 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:44.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333331653336656538376430326462323137393631346463666162 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit: BPF prog-id=78 op=LOAD Feb 9 18:24:44.637000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1564 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:44.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333331653336656538376430326462323137393631346463666162 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit: BPF prog-id=79 op=LOAD Feb 9 18:24:44.637000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1564 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:44.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333331653336656538376430326462323137393631346463666162 Feb 9 18:24:44.637000 audit: BPF prog-id=79 op=UNLOAD Feb 9 18:24:44.637000 audit: BPF prog-id=78 op=UNLOAD Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:44.637000 audit: BPF prog-id=80 op=LOAD Feb 9 18:24:44.637000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1564 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:44.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333331653336656538376430326462323137393631346463666162 Feb 9 18:24:44.654027 env[1139]: time="2024-02-09T18:24:44.653952711Z" level=info msg="StartContainer for \"37331e36ee87d02db2179614dcfab434a1e2bcb5856d7006c0e727b73f32c608\" returns successfully" Feb 9 18:24:44.658996 systemd[1]: cri-containerd-37331e36ee87d02db2179614dcfab434a1e2bcb5856d7006c0e727b73f32c608.scope: Deactivated successfully. Feb 9 18:24:44.664000 audit: BPF prog-id=80 op=UNLOAD Feb 9 18:24:44.793798 env[1139]: time="2024-02-09T18:24:44.793660195Z" level=info msg="shim disconnected" id=37331e36ee87d02db2179614dcfab434a1e2bcb5856d7006c0e727b73f32c608 Feb 9 18:24:44.793798 env[1139]: time="2024-02-09T18:24:44.793708096Z" level=warning msg="cleaning up after shim disconnected" id=37331e36ee87d02db2179614dcfab434a1e2bcb5856d7006c0e727b73f32c608 namespace=k8s.io Feb 9 18:24:44.793798 env[1139]: time="2024-02-09T18:24:44.793719313Z" level=info msg="cleaning up dead shim" Feb 9 18:24:44.801185 env[1139]: time="2024-02-09T18:24:44.801138590Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:24:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1862 runtime=io.containerd.runc.v2\n" Feb 9 18:24:45.112466 kubelet[1441]: E0209 18:24:45.112339 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:45.208082 kubelet[1441]: E0209 18:24:45.208041 1441 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwzkj" podUID=d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3 Feb 9 18:24:45.219643 kubelet[1441]: E0209 18:24:45.219616 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:45.220053 kubelet[1441]: E0209 18:24:45.219982 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:45.220770 env[1139]: time="2024-02-09T18:24:45.220730042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 18:24:45.449239 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-37331e36ee87d02db2179614dcfab434a1e2bcb5856d7006c0e727b73f32c608-rootfs.mount: Deactivated successfully. Feb 9 18:24:46.113249 kubelet[1441]: E0209 18:24:46.113220 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:46.190506 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2885743231.mount: Deactivated successfully. Feb 9 18:24:47.114355 kubelet[1441]: E0209 18:24:47.114327 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:47.209030 kubelet[1441]: E0209 18:24:47.207910 1441 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwzkj" podUID=d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3 Feb 9 18:24:48.001576 env[1139]: time="2024-02-09T18:24:48.001532192Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:48.003320 env[1139]: time="2024-02-09T18:24:48.003285084Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:48.004600 env[1139]: time="2024-02-09T18:24:48.004572855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:48.006322 env[1139]: time="2024-02-09T18:24:48.006291027Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:48.006961 env[1139]: time="2024-02-09T18:24:48.006929579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 18:24:48.008549 env[1139]: time="2024-02-09T18:24:48.008516310Z" level=info msg="CreateContainer within sandbox \"a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 18:24:48.019048 env[1139]: time="2024-02-09T18:24:48.019013518Z" level=info msg="CreateContainer within sandbox \"a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032\"" Feb 9 18:24:48.019501 env[1139]: time="2024-02-09T18:24:48.019477520Z" level=info msg="StartContainer for \"f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032\"" Feb 9 18:24:48.035731 systemd[1]: run-containerd-runc-k8s.io-f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032-runc.vZtO99.mount: Deactivated successfully. Feb 9 18:24:48.037793 systemd[1]: Started cri-containerd-f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032.scope. Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1564 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:48.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623437326262616365383130333964363761316430616538393962 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.059000 audit: BPF prog-id=81 op=LOAD Feb 9 18:24:48.059000 audit[1888]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1564 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:48.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623437326262616365383130333964363761316430616538393962 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit: BPF prog-id=82 op=LOAD Feb 9 18:24:48.060000 audit[1888]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1564 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:48.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623437326262616365383130333964363761316430616538393962 Feb 9 18:24:48.060000 audit: BPF prog-id=82 op=UNLOAD Feb 9 18:24:48.060000 audit: BPF prog-id=81 op=UNLOAD Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:48.060000 audit: BPF prog-id=83 op=LOAD Feb 9 18:24:48.060000 audit[1888]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1564 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:48.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623437326262616365383130333964363761316430616538393962 Feb 9 18:24:48.086367 env[1139]: time="2024-02-09T18:24:48.086290442Z" level=info msg="StartContainer for \"f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032\" returns successfully" Feb 9 18:24:48.115504 kubelet[1441]: E0209 18:24:48.115442 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:48.225173 kubelet[1441]: E0209 18:24:48.224854 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:48.589121 systemd[1]: cri-containerd-f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032.scope: Deactivated successfully. Feb 9 18:24:48.592000 audit: BPF prog-id=83 op=UNLOAD Feb 9 18:24:48.594160 kernel: kauditd_printk_skb: 273 callbacks suppressed Feb 9 18:24:48.594238 kernel: audit: type=1334 audit(1707503088.592:663): prog-id=83 op=UNLOAD Feb 9 18:24:48.607390 kubelet[1441]: I0209 18:24:48.606665 1441 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 18:24:48.834707 env[1139]: time="2024-02-09T18:24:48.834652044Z" level=info msg="shim disconnected" id=f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032 Feb 9 18:24:48.834707 env[1139]: time="2024-02-09T18:24:48.834699666Z" level=warning msg="cleaning up after shim disconnected" id=f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032 namespace=k8s.io Feb 9 18:24:48.834707 env[1139]: time="2024-02-09T18:24:48.834709974Z" level=info msg="cleaning up dead shim" Feb 9 18:24:48.842256 env[1139]: time="2024-02-09T18:24:48.841947505Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:24:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1937 runtime=io.containerd.runc.v2\n" Feb 9 18:24:49.015774 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f2b472bbace81039d67a1d0ae899ba19f3b51ea0a75c431fdaf0b7fbece49032-rootfs.mount: Deactivated successfully. Feb 9 18:24:49.116165 kubelet[1441]: E0209 18:24:49.115906 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:49.212458 systemd[1]: Created slice kubepods-besteffort-podd245cb9a_0095_4f7f_b53e_dbff5a6bbcd3.slice. Feb 9 18:24:49.214682 env[1139]: time="2024-02-09T18:24:49.214639361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwzkj,Uid:d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3,Namespace:calico-system,Attempt:0,}" Feb 9 18:24:49.227861 kubelet[1441]: E0209 18:24:49.227832 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:49.228924 env[1139]: time="2024-02-09T18:24:49.228881088Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 18:24:49.277106 env[1139]: time="2024-02-09T18:24:49.277029999Z" level=error msg="Failed to destroy network for sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:49.277573 env[1139]: time="2024-02-09T18:24:49.277540382Z" level=error msg="encountered an error cleaning up failed sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:49.277701 env[1139]: time="2024-02-09T18:24:49.277674161Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwzkj,Uid:d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:49.278405 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff-shm.mount: Deactivated successfully. Feb 9 18:24:49.278816 kubelet[1441]: E0209 18:24:49.278692 1441 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:49.278816 kubelet[1441]: E0209 18:24:49.278759 1441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lwzkj" Feb 9 18:24:49.278816 kubelet[1441]: E0209 18:24:49.278785 1441 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lwzkj" Feb 9 18:24:49.278942 kubelet[1441]: E0209 18:24:49.278843 1441 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lwzkj_calico-system(d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lwzkj_calico-system(d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lwzkj" podUID=d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3 Feb 9 18:24:50.116099 kubelet[1441]: E0209 18:24:50.116049 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:50.232892 kubelet[1441]: I0209 18:24:50.232851 1441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Feb 9 18:24:50.233630 env[1139]: time="2024-02-09T18:24:50.233581873Z" level=info msg="StopPodSandbox for \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\"" Feb 9 18:24:50.260042 env[1139]: time="2024-02-09T18:24:50.259984875Z" level=error msg="StopPodSandbox for \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\" failed" error="failed to destroy network for sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:50.260330 kubelet[1441]: E0209 18:24:50.260305 1441 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Feb 9 18:24:50.260409 kubelet[1441]: E0209 18:24:50.260375 1441 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff} Feb 9 18:24:50.260441 kubelet[1441]: E0209 18:24:50.260411 1441 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:24:50.260494 kubelet[1441]: E0209 18:24:50.260447 1441 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lwzkj" podUID=d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3 Feb 9 18:24:51.116806 kubelet[1441]: E0209 18:24:51.116762 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:52.117456 kubelet[1441]: E0209 18:24:52.117391 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:52.502089 kernel: audit: type=1325 audit(1707503092.495:664): table=filter:65 family=2 entries=14 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:52.502211 kernel: audit: type=1300 audit(1707503092.495:664): arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff50d9810 a2=0 a3=ffff872aa6c0 items=0 ppid=1647 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:52.502232 kernel: audit: type=1327 audit(1707503092.495:664): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:52.495000 audit[2014]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:52.495000 audit[2014]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff50d9810 a2=0 a3=ffff872aa6c0 items=0 ppid=1647 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:52.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:52.511462 kernel: audit: type=1325 audit(1707503092.506:665): table=nat:66 family=2 entries=14 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:52.511564 kernel: audit: type=1300 audit(1707503092.506:665): arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=fffff50d9810 a2=0 a3=ffff872aa6c0 items=0 ppid=1647 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:52.506000 audit[2014]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:52.506000 audit[2014]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=fffff50d9810 a2=0 a3=ffff872aa6c0 items=0 ppid=1647 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:52.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:52.513128 kernel: audit: type=1327 audit(1707503092.506:665): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:52.518000 audit[2016]: NETFILTER_CFG table=filter:67 family=2 entries=11 op=nft_register_rule pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:52.518000 audit[2016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffeee65980 a2=0 a3=ffff8ed296c0 items=0 ppid=1647 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:52.524117 kernel: audit: type=1325 audit(1707503092.518:666): table=filter:67 family=2 entries=11 op=nft_register_rule pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:52.524172 kernel: audit: type=1300 audit(1707503092.518:666): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffeee65980 a2=0 a3=ffff8ed296c0 items=0 ppid=1647 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:52.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:52.527281 kernel: audit: type=1327 audit(1707503092.518:666): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:52.527000 audit[2016]: NETFILTER_CFG table=nat:68 family=2 entries=47 op=nft_register_chain pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:24:52.527000 audit[2016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffeee65980 a2=0 a3=ffff8ed296c0 items=0 ppid=1647 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:52.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:24:52.608025 kubelet[1441]: I0209 18:24:52.607983 1441 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:24:52.613062 systemd[1]: Created slice kubepods-besteffort-pod9a5f4c5f_6298_4e37_94ed_b44c042c254a.slice. Feb 9 18:24:52.700203 kubelet[1441]: I0209 18:24:52.700157 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c6psf\" (UniqueName: \"kubernetes.io/projected/9a5f4c5f-6298-4e37-94ed-b44c042c254a-kube-api-access-c6psf\") pod \"nginx-deployment-845c78c8b9-6gjdg\" (UID: \"9a5f4c5f-6298-4e37-94ed-b44c042c254a\") " pod="default/nginx-deployment-845c78c8b9-6gjdg" Feb 9 18:24:52.915872 env[1139]: time="2024-02-09T18:24:52.915817907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-6gjdg,Uid:9a5f4c5f-6298-4e37-94ed-b44c042c254a,Namespace:default,Attempt:0,}" Feb 9 18:24:53.117826 kubelet[1441]: E0209 18:24:53.117780 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:53.195419 env[1139]: time="2024-02-09T18:24:53.195092672Z" level=error msg="Failed to destroy network for sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:53.195917 env[1139]: time="2024-02-09T18:24:53.195881465Z" level=error msg="encountered an error cleaning up failed sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:53.196046 env[1139]: time="2024-02-09T18:24:53.196017741Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-6gjdg,Uid:9a5f4c5f-6298-4e37-94ed-b44c042c254a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:53.196399 kubelet[1441]: E0209 18:24:53.196359 1441 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:53.196472 kubelet[1441]: E0209 18:24:53.196418 1441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-6gjdg" Feb 9 18:24:53.196472 kubelet[1441]: E0209 18:24:53.196439 1441 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-6gjdg" Feb 9 18:24:53.196527 kubelet[1441]: E0209 18:24:53.196485 1441 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-6gjdg_default(9a5f4c5f-6298-4e37-94ed-b44c042c254a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-6gjdg_default(9a5f4c5f-6298-4e37-94ed-b44c042c254a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-6gjdg" podUID=9a5f4c5f-6298-4e37-94ed-b44c042c254a Feb 9 18:24:53.196804 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659-shm.mount: Deactivated successfully. Feb 9 18:24:53.236890 kubelet[1441]: I0209 18:24:53.236852 1441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Feb 9 18:24:53.237306 env[1139]: time="2024-02-09T18:24:53.237260461Z" level=info msg="StopPodSandbox for \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\"" Feb 9 18:24:53.256976 env[1139]: time="2024-02-09T18:24:53.256922173Z" level=error msg="StopPodSandbox for \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\" failed" error="failed to destroy network for sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:24:53.257207 kubelet[1441]: E0209 18:24:53.257172 1441 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Feb 9 18:24:53.257268 kubelet[1441]: E0209 18:24:53.257223 1441 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659} Feb 9 18:24:53.257268 kubelet[1441]: E0209 18:24:53.257256 1441 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a5f4c5f-6298-4e37-94ed-b44c042c254a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:24:53.257353 kubelet[1441]: E0209 18:24:53.257293 1441 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a5f4c5f-6298-4e37-94ed-b44c042c254a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-6gjdg" podUID=9a5f4c5f-6298-4e37-94ed-b44c042c254a Feb 9 18:24:53.549262 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1578594530.mount: Deactivated successfully. Feb 9 18:24:53.752765 env[1139]: time="2024-02-09T18:24:53.752702240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:53.753717 env[1139]: time="2024-02-09T18:24:53.753684554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:53.754898 env[1139]: time="2024-02-09T18:24:53.754870503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:53.756375 env[1139]: time="2024-02-09T18:24:53.756352269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:24:53.756807 env[1139]: time="2024-02-09T18:24:53.756780285Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 18:24:53.763340 env[1139]: time="2024-02-09T18:24:53.763300183Z" level=info msg="CreateContainer within sandbox \"a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 18:24:53.774102 env[1139]: time="2024-02-09T18:24:53.774060905Z" level=info msg="CreateContainer within sandbox \"a20c70ef5d6146524cc8283488a1ac1cac40a09c24d514586f9e96a8c6e046cd\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4375b79e47df5973c464ca48d031e9fe29b25c82609fa9ad6351d2a1bd266a00\"" Feb 9 18:24:53.774528 env[1139]: time="2024-02-09T18:24:53.774487762Z" level=info msg="StartContainer for \"4375b79e47df5973c464ca48d031e9fe29b25c82609fa9ad6351d2a1bd266a00\"" Feb 9 18:24:53.788724 systemd[1]: Started cri-containerd-4375b79e47df5973c464ca48d031e9fe29b25c82609fa9ad6351d2a1bd266a00.scope. Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.821370 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 18:24:53.821441 kernel: audit: type=1400 audit(1707503093.817:668): avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.821470 kernel: audit: type=1300 audit(1707503093.817:668): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1564 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:53.817000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1564 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:53.823888 kernel: audit: type=1327 audit(1707503093.817:668): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373562373965343764663539373363343634636134386430333165 Feb 9 18:24:53.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373562373965343764663539373363343634636134386430333165 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.827888 kernel: audit: type=1400 audit(1707503093.817:669): avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.827958 kernel: audit: type=1400 audit(1707503093.817:669): avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.831359 kernel: audit: type=1400 audit(1707503093.817:669): avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.831443 kernel: audit: type=1400 audit(1707503093.817:669): avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.833034 kernel: audit: type=1400 audit(1707503093.817:669): avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.834703 kernel: audit: type=1400 audit(1707503093.817:669): avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.838220 kernel: audit: type=1400 audit(1707503093.817:669): avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit: BPF prog-id=84 op=LOAD Feb 9 18:24:53.817000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1564 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:53.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373562373965343764663539373363343634636134386430333165 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.817000 audit: BPF prog-id=85 op=LOAD Feb 9 18:24:53.817000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1564 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:53.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373562373965343764663539373363343634636134386430333165 Feb 9 18:24:53.819000 audit: BPF prog-id=85 op=UNLOAD Feb 9 18:24:53.819000 audit: BPF prog-id=84 op=UNLOAD Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:53.819000 audit: BPF prog-id=86 op=LOAD Feb 9 18:24:53.819000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1564 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:53.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373562373965343764663539373363343634636134386430333165 Feb 9 18:24:53.848655 env[1139]: time="2024-02-09T18:24:53.848607403Z" level=info msg="StartContainer for \"4375b79e47df5973c464ca48d031e9fe29b25c82609fa9ad6351d2a1bd266a00\" returns successfully" Feb 9 18:24:53.959257 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 18:24:53.959428 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Feb 9 18:24:54.118719 kubelet[1441]: E0209 18:24:54.118591 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:54.240978 kubelet[1441]: E0209 18:24:54.240912 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:54.262326 systemd[1]: run-containerd-runc-k8s.io-4375b79e47df5973c464ca48d031e9fe29b25c82609fa9ad6351d2a1bd266a00-runc.iRbZMs.mount: Deactivated successfully. Feb 9 18:24:54.267806 kubelet[1441]: I0209 18:24:54.267745 1441 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-vgt5l" podStartSLOduration=2.579134302 podCreationTimestamp="2024-02-09 18:24:40 +0000 UTC" firstStartedPulling="2024-02-09 18:24:42.068511437 +0000 UTC m=+3.538969739" lastFinishedPulling="2024-02-09 18:24:53.757085496 +0000 UTC m=+15.227543799" observedRunningTime="2024-02-09 18:24:54.267624168 +0000 UTC m=+15.738082431" watchObservedRunningTime="2024-02-09 18:24:54.267708362 +0000 UTC m=+15.738166665" Feb 9 18:24:55.119699 kubelet[1441]: E0209 18:24:55.119631 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:55.200000 audit[2209]: AVC avc: denied { write } for pid=2209 comm="tee" name="fd" dev="proc" ino=15368 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:24:55.200000 audit[2209]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffea38197f a2=241 a3=1b6 items=1 ppid=2203 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.200000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 18:24:55.200000 audit: PATH item=0 name="/dev/fd/63" inode=13268 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:55.200000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:24:55.201000 audit[2220]: AVC avc: denied { write } for pid=2220 comm="tee" name="fd" dev="proc" ino=13273 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:24:55.201000 audit[2220]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcc6c398f a2=241 a3=1b6 items=1 ppid=2193 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.201000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 18:24:55.201000 audit: PATH item=0 name="/dev/fd/63" inode=13956 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:55.201000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:24:55.203000 audit[2232]: AVC avc: denied { write } for pid=2232 comm="tee" name="fd" dev="proc" ino=14819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:24:55.203000 audit[2232]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe05d6980 a2=241 a3=1b6 items=1 ppid=2185 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.203000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 18:24:55.203000 audit: PATH item=0 name="/dev/fd/63" inode=15370 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:55.203000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:24:55.233000 audit[2242]: AVC avc: denied { write } for pid=2242 comm="tee" name="fd" dev="proc" ino=14849 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:24:55.233000 audit[2242]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0f8f991 a2=241 a3=1b6 items=1 ppid=2214 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.233000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 18:24:55.233000 audit: PATH item=0 name="/dev/fd/63" inode=14827 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:55.233000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:24:55.238000 audit[2256]: AVC avc: denied { write } for pid=2256 comm="tee" name="fd" dev="proc" ino=13288 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:24:55.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff4dc198f a2=241 a3=1b6 items=1 ppid=2189 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.238000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 18:24:55.238000 audit: PATH item=0 name="/dev/fd/63" inode=14840 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:55.238000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:24:55.242433 kubelet[1441]: E0209 18:24:55.242398 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:24:55.246000 audit[2262]: AVC avc: denied { write } for pid=2262 comm="tee" name="fd" dev="proc" ino=14857 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:24:55.246000 audit[2262]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff9af698f a2=241 a3=1b6 items=1 ppid=2223 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.246000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 18:24:55.246000 audit: PATH item=0 name="/dev/fd/63" inode=14851 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:55.246000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:24:55.256000 audit[2273]: AVC avc: denied { write } for pid=2273 comm="tee" name="fd" dev="proc" ino=13297 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:24:55.256000 audit[2273]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3fcb990 a2=241 a3=1b6 items=1 ppid=2229 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.256000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 18:24:55.256000 audit: PATH item=0 name="/dev/fd/63" inode=14859 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:24:55.256000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:24:55.364781 kernel: Initializing XFRM netlink socket Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.458000 audit: BPF prog-id=87 op=LOAD Feb 9 18:24:55.458000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd30e3688 a2=70 a3=0 items=0 ppid=2194 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.458000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:24:55.459000 audit: BPF prog-id=87 op=UNLOAD Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit: BPF prog-id=88 op=LOAD Feb 9 18:24:55.459000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd30e3688 a2=70 a3=4a174c items=0 ppid=2194 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.459000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:24:55.459000 audit: BPF prog-id=88 op=UNLOAD Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd30e36b8 a2=70 a3=3a31a79f items=0 ppid=2194 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.459000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.459000 audit: BPF prog-id=89 op=LOAD Feb 9 18:24:55.459000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffd30e3608 a2=70 a3=3a31a7b9 items=0 ppid=2194 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.459000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:24:55.464000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.464000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe011d4d8 a2=70 a3=0 items=0 ppid=2194 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:24:55.464000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:24:55.464000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe011d3b8 a2=70 a3=2 items=0 ppid=2194 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:24:55.473000 audit: BPF prog-id=89 op=UNLOAD Feb 9 18:24:55.508000 audit[2388]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:24:55.508000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffdc322ac0 a2=0 a3=ffffb011afa8 items=0 ppid=2194 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.508000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:24:55.513000 audit[2387]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:24:55.513000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffcb6bb090 a2=0 a3=ffffa9b3bfa8 items=0 ppid=2194 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.513000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:24:55.519000 audit[2392]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:24:55.519000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffffa722270 a2=0 a3=ffff80f06fa8 items=0 ppid=2194 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:24:55.519000 audit[2389]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:24:55.519000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffff36274d0 a2=0 a3=ffff8d174fa8 items=0 ppid=2194 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:24:55.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:24:56.120370 kubelet[1441]: E0209 18:24:56.120324 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:56.375807 systemd-networkd[1052]: vxlan.calico: Link UP Feb 9 18:24:56.375813 systemd-networkd[1052]: vxlan.calico: Gained carrier Feb 9 18:24:57.121400 kubelet[1441]: E0209 18:24:57.121279 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:58.122273 kubelet[1441]: E0209 18:24:58.122232 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:58.398942 systemd-networkd[1052]: vxlan.calico: Gained IPv6LL Feb 9 18:24:59.108982 kubelet[1441]: E0209 18:24:59.108911 1441 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:24:59.123126 kubelet[1441]: E0209 18:24:59.123064 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:00.123371 kubelet[1441]: E0209 18:25:00.123309 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:01.124131 kubelet[1441]: E0209 18:25:01.124098 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:02.125564 kubelet[1441]: E0209 18:25:02.125528 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:03.126495 kubelet[1441]: E0209 18:25:03.126454 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:04.127174 kubelet[1441]: E0209 18:25:04.127104 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:04.207990 env[1139]: time="2024-02-09T18:25:04.207940674Z" level=info msg="StopPodSandbox for \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\"" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.249 [INFO][2428] k8s.go 578: Cleaning up netns ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.249 [INFO][2428] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" iface="eth0" netns="/var/run/netns/cni-0490df5b-1c37-6344-a99d-0f5f1a7c8205" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.249 [INFO][2428] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" iface="eth0" netns="/var/run/netns/cni-0490df5b-1c37-6344-a99d-0f5f1a7c8205" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.249 [INFO][2428] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" iface="eth0" netns="/var/run/netns/cni-0490df5b-1c37-6344-a99d-0f5f1a7c8205" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.249 [INFO][2428] k8s.go 585: Releasing IP address(es) ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.249 [INFO][2428] utils.go 188: Calico CNI releasing IP address ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.300 [INFO][2435] ipam_plugin.go 415: Releasing address using handleID ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" HandleID="k8s-pod-network.fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Workload="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.300 [INFO][2435] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.300 [INFO][2435] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.310 [WARNING][2435] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" HandleID="k8s-pod-network.fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Workload="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.310 [INFO][2435] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" HandleID="k8s-pod-network.fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Workload="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.312 [INFO][2435] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:25:04.314444 env[1139]: 2024-02-09 18:25:04.313 [INFO][2428] k8s.go 591: Teardown processing complete. ContainerID="fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff" Feb 9 18:25:04.316186 systemd[1]: run-netns-cni\x2d0490df5b\x2d1c37\x2d6344\x2da99d\x2d0f5f1a7c8205.mount: Deactivated successfully. Feb 9 18:25:04.317033 env[1139]: time="2024-02-09T18:25:04.316994754Z" level=info msg="TearDown network for sandbox \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\" successfully" Feb 9 18:25:04.317133 env[1139]: time="2024-02-09T18:25:04.317115936Z" level=info msg="StopPodSandbox for \"fac270f32bbc85b9db7ea3f6fb2da3831336bbbd1923cd71c880b234eb28ecff\" returns successfully" Feb 9 18:25:04.317846 env[1139]: time="2024-02-09T18:25:04.317817832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwzkj,Uid:d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3,Namespace:calico-system,Attempt:1,}" Feb 9 18:25:04.425729 systemd-networkd[1052]: cali6a654033f93: Link UP Feb 9 18:25:04.428229 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:25:04.428305 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6a654033f93: link becomes ready Feb 9 18:25:04.428043 systemd-networkd[1052]: cali6a654033f93: Gained carrier Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.359 [INFO][2443] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.38-k8s-csi--node--driver--lwzkj-eth0 csi-node-driver- calico-system d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3 943 0 2024-02-09 18:24:40 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.38 csi-node-driver-lwzkj eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali6a654033f93 [] []}} ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Namespace="calico-system" Pod="csi-node-driver-lwzkj" WorkloadEndpoint="10.0.0.38-k8s-csi--node--driver--lwzkj-" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.359 [INFO][2443] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Namespace="calico-system" Pod="csi-node-driver-lwzkj" WorkloadEndpoint="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.381 [INFO][2457] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" HandleID="k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Workload="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.393 [INFO][2457] ipam_plugin.go 268: Auto assigning IP ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" HandleID="k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Workload="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d13f0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.38", "pod":"csi-node-driver-lwzkj", "timestamp":"2024-02-09 18:25:04.381215805 +0000 UTC"}, Hostname:"10.0.0.38", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.393 [INFO][2457] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.393 [INFO][2457] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.393 [INFO][2457] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.38' Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.394 [INFO][2457] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.398 [INFO][2457] ipam.go 372: Looking up existing affinities for host host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.404 [INFO][2457] ipam.go 489: Trying affinity for 192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.410 [INFO][2457] ipam.go 155: Attempting to load block cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.412 [INFO][2457] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.412 [INFO][2457] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.64/26 handle="k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.413 [INFO][2457] ipam.go 1682: Creating new handle: k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.417 [INFO][2457] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.64/26 handle="k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.421 [INFO][2457] ipam.go 1216: Successfully claimed IPs: [192.168.116.65/26] block=192.168.116.64/26 handle="k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.421 [INFO][2457] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.65/26] handle="k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" host="10.0.0.38" Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.421 [INFO][2457] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:25:04.437563 env[1139]: 2024-02-09 18:25:04.421 [INFO][2457] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.65/26] IPv6=[] ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" HandleID="k8s-pod-network.b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Workload="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.438345 env[1139]: 2024-02-09 18:25:04.423 [INFO][2443] k8s.go 385: Populated endpoint ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Namespace="calico-system" Pod="csi-node-driver-lwzkj" WorkloadEndpoint="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-csi--node--driver--lwzkj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 24, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"", Pod:"csi-node-driver-lwzkj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6a654033f93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:04.438345 env[1139]: 2024-02-09 18:25:04.423 [INFO][2443] k8s.go 386: Calico CNI using IPs: [192.168.116.65/32] ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Namespace="calico-system" Pod="csi-node-driver-lwzkj" WorkloadEndpoint="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.438345 env[1139]: 2024-02-09 18:25:04.423 [INFO][2443] dataplane_linux.go 68: Setting the host side veth name to cali6a654033f93 ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Namespace="calico-system" Pod="csi-node-driver-lwzkj" WorkloadEndpoint="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.438345 env[1139]: 2024-02-09 18:25:04.428 [INFO][2443] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Namespace="calico-system" Pod="csi-node-driver-lwzkj" WorkloadEndpoint="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.438345 env[1139]: 2024-02-09 18:25:04.429 [INFO][2443] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Namespace="calico-system" Pod="csi-node-driver-lwzkj" WorkloadEndpoint="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-csi--node--driver--lwzkj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 24, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b", Pod:"csi-node-driver-lwzkj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6a654033f93", MAC:"a2:6f:a4:ad:c8:b8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:04.438345 env[1139]: 2024-02-09 18:25:04.436 [INFO][2443] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b" Namespace="calico-system" Pod="csi-node-driver-lwzkj" WorkloadEndpoint="10.0.0.38-k8s-csi--node--driver--lwzkj-eth0" Feb 9 18:25:04.451715 env[1139]: time="2024-02-09T18:25:04.451630455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:25:04.451715 env[1139]: time="2024-02-09T18:25:04.451670649Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:25:04.451963 env[1139]: time="2024-02-09T18:25:04.451919492Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:25:04.452269 env[1139]: time="2024-02-09T18:25:04.452172615Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b pid=2490 runtime=io.containerd.runc.v2 Feb 9 18:25:04.452000 audit[2495]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:25:04.455735 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 9 18:25:04.455802 kernel: audit: type=1325 audit(1707503104.452:694): table=filter:73 family=2 entries=36 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:25:04.455828 kernel: audit: type=1300 audit(1707503104.452:694): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffecfa3390 a2=0 a3=ffff961f6fa8 items=0 ppid=2194 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:04.452000 audit[2495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffecfa3390 a2=0 a3=ffff961f6fa8 items=0 ppid=2194 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:04.452000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:25:04.459950 kernel: audit: type=1327 audit(1707503104.452:694): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:25:04.466259 systemd[1]: Started cri-containerd-b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b.scope. Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.491102 kernel: audit: type=1400 audit(1707503104.486:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.491170 kernel: audit: type=1400 audit(1707503104.486:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.491192 kernel: audit: type=1400 audit(1707503104.486:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492880 kernel: audit: type=1400 audit(1707503104.486:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.494677 kernel: audit: type=1400 audit(1707503104.486:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.496610 systemd-resolved[1091]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:25:04.498345 kernel: audit: type=1400 audit(1707503104.486:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.498400 kernel: audit: type=1400 audit(1707503104.486:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit: BPF prog-id=90 op=LOAD Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2490 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:04.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333866393534646233366634626665373862363536366137646662 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2490 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:04.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333866393534646233366634626665373862363536366137646662 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.488000 audit: BPF prog-id=91 op=LOAD Feb 9 18:25:04.488000 audit[2501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2490 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:04.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333866393534646233366634626665373862363536366137646662 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.490000 audit: BPF prog-id=92 op=LOAD Feb 9 18:25:04.490000 audit[2501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2490 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:04.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333866393534646233366634626665373862363536366137646662 Feb 9 18:25:04.492000 audit: BPF prog-id=92 op=UNLOAD Feb 9 18:25:04.492000 audit: BPF prog-id=91 op=UNLOAD Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:04.492000 audit: BPF prog-id=93 op=LOAD Feb 9 18:25:04.492000 audit[2501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2490 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:04.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333866393534646233366634626665373862363536366137646662 Feb 9 18:25:04.510274 env[1139]: time="2024-02-09T18:25:04.510227742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwzkj,Uid:d245cb9a-0095-4f7f-b53e-dbff5a6bbcd3,Namespace:calico-system,Attempt:1,} returns sandbox id \"b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b\"" Feb 9 18:25:04.511740 env[1139]: time="2024-02-09T18:25:04.511713402Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 18:25:05.127599 kubelet[1441]: E0209 18:25:05.127565 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:05.758958 systemd-networkd[1052]: cali6a654033f93: Gained IPv6LL Feb 9 18:25:05.977677 env[1139]: time="2024-02-09T18:25:05.977628371Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:05.979680 env[1139]: time="2024-02-09T18:25:05.979642448Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:05.981020 env[1139]: time="2024-02-09T18:25:05.980991646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:05.982489 env[1139]: time="2024-02-09T18:25:05.982455917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:05.982847 env[1139]: time="2024-02-09T18:25:05.982816855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 18:25:05.984552 env[1139]: time="2024-02-09T18:25:05.984519031Z" level=info msg="CreateContainer within sandbox \"b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 18:25:05.994011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3136500875.mount: Deactivated successfully. Feb 9 18:25:05.995469 env[1139]: time="2024-02-09T18:25:05.995430847Z" level=info msg="CreateContainer within sandbox \"b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9c0fd5585207b1cbbe3aa70df7797eea96bdc7349593fe1420b094343115ce7a\"" Feb 9 18:25:05.995867 env[1139]: time="2024-02-09T18:25:05.995840822Z" level=info msg="StartContainer for \"9c0fd5585207b1cbbe3aa70df7797eea96bdc7349593fe1420b094343115ce7a\"" Feb 9 18:25:06.013452 systemd[1]: Started cri-containerd-9c0fd5585207b1cbbe3aa70df7797eea96bdc7349593fe1420b094343115ce7a.scope. Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2490 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:06.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963306664353538353230376231636262653361613730646637373937 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit: BPF prog-id=94 op=LOAD Feb 9 18:25:06.035000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2490 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:06.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963306664353538353230376231636262653361613730646637373937 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit: BPF prog-id=95 op=LOAD Feb 9 18:25:06.035000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2490 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:06.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963306664353538353230376231636262653361613730646637373937 Feb 9 18:25:06.035000 audit: BPF prog-id=95 op=UNLOAD Feb 9 18:25:06.035000 audit: BPF prog-id=94 op=UNLOAD Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:06.035000 audit: BPF prog-id=96 op=LOAD Feb 9 18:25:06.035000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2490 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:06.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963306664353538353230376231636262653361613730646637373937 Feb 9 18:25:06.047197 env[1139]: time="2024-02-09T18:25:06.047157813Z" level=info msg="StartContainer for \"9c0fd5585207b1cbbe3aa70df7797eea96bdc7349593fe1420b094343115ce7a\" returns successfully" Feb 9 18:25:06.049686 env[1139]: time="2024-02-09T18:25:06.049655110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 18:25:06.127987 kubelet[1441]: E0209 18:25:06.127918 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:07.128313 kubelet[1441]: E0209 18:25:07.128260 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:07.297411 env[1139]: time="2024-02-09T18:25:07.297365302Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:07.299076 env[1139]: time="2024-02-09T18:25:07.299048531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:07.300676 env[1139]: time="2024-02-09T18:25:07.300622085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:07.302121 env[1139]: time="2024-02-09T18:25:07.302097845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:07.302582 env[1139]: time="2024-02-09T18:25:07.302531822Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 18:25:07.304647 env[1139]: time="2024-02-09T18:25:07.304611029Z" level=info msg="CreateContainer within sandbox \"b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 18:25:07.315276 env[1139]: time="2024-02-09T18:25:07.315239411Z" level=info msg="CreateContainer within sandbox \"b338f954db36f4bfe78b6566a7dfb4e528ae7e9a0e34891b01bee76043d18b9b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b72bc2b7144bf74d12735d2a5d6a4e2f7278d3804475c4756d73b3840c1240b6\"" Feb 9 18:25:07.315890 env[1139]: time="2024-02-09T18:25:07.315854698Z" level=info msg="StartContainer for \"b72bc2b7144bf74d12735d2a5d6a4e2f7278d3804475c4756d73b3840c1240b6\"" Feb 9 18:25:07.334898 systemd[1]: run-containerd-runc-k8s.io-b72bc2b7144bf74d12735d2a5d6a4e2f7278d3804475c4756d73b3840c1240b6-runc.JnnhQK.mount: Deactivated successfully. Feb 9 18:25:07.337782 systemd[1]: Started cri-containerd-b72bc2b7144bf74d12735d2a5d6a4e2f7278d3804475c4756d73b3840c1240b6.scope. Feb 9 18:25:07.357000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.357000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2490 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:07.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237326263326237313434626637346431323733356432613564366134 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit: BPF prog-id=97 op=LOAD Feb 9 18:25:07.358000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2490 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:07.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237326263326237313434626637346431323733356432613564366134 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.358000 audit: BPF prog-id=98 op=LOAD Feb 9 18:25:07.358000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2490 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:07.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237326263326237313434626637346431323733356432613564366134 Feb 9 18:25:07.359000 audit: BPF prog-id=98 op=UNLOAD Feb 9 18:25:07.359000 audit: BPF prog-id=97 op=UNLOAD Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:07.359000 audit: BPF prog-id=99 op=LOAD Feb 9 18:25:07.359000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2490 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:07.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237326263326237313434626637346431323733356432613564366134 Feb 9 18:25:07.378896 env[1139]: time="2024-02-09T18:25:07.378785117Z" level=info msg="StartContainer for \"b72bc2b7144bf74d12735d2a5d6a4e2f7278d3804475c4756d73b3840c1240b6\" returns successfully" Feb 9 18:25:08.129304 kubelet[1441]: E0209 18:25:08.129263 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:08.205904 kubelet[1441]: I0209 18:25:08.205799 1441 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 18:25:08.205904 kubelet[1441]: I0209 18:25:08.205826 1441 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 18:25:08.207987 env[1139]: time="2024-02-09T18:25:08.207903774Z" level=info msg="StopPodSandbox for \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\"" Feb 9 18:25:08.277537 kubelet[1441]: I0209 18:25:08.277496 1441 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-lwzkj" podStartSLOduration=25.485729427 podCreationTimestamp="2024-02-09 18:24:40 +0000 UTC" firstStartedPulling="2024-02-09 18:25:04.511327939 +0000 UTC m=+25.981786202" lastFinishedPulling="2024-02-09 18:25:07.303051113 +0000 UTC m=+28.773509416" observedRunningTime="2024-02-09 18:25:08.277289009 +0000 UTC m=+29.747747312" watchObservedRunningTime="2024-02-09 18:25:08.277452641 +0000 UTC m=+29.747910944" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.245 [INFO][2622] k8s.go 578: Cleaning up netns ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.245 [INFO][2622] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" iface="eth0" netns="/var/run/netns/cni-bf0c1dab-fd05-32a6-2023-5b19832a88ed" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.245 [INFO][2622] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" iface="eth0" netns="/var/run/netns/cni-bf0c1dab-fd05-32a6-2023-5b19832a88ed" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.245 [INFO][2622] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" iface="eth0" netns="/var/run/netns/cni-bf0c1dab-fd05-32a6-2023-5b19832a88ed" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.245 [INFO][2622] k8s.go 585: Releasing IP address(es) ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.245 [INFO][2622] utils.go 188: Calico CNI releasing IP address ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.261 [INFO][2630] ipam_plugin.go 415: Releasing address using handleID ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" HandleID="k8s-pod-network.b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Workload="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.261 [INFO][2630] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.261 [INFO][2630] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.274 [WARNING][2630] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" HandleID="k8s-pod-network.b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Workload="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.274 [INFO][2630] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" HandleID="k8s-pod-network.b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Workload="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.275 [INFO][2630] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:25:08.278396 env[1139]: 2024-02-09 18:25:08.276 [INFO][2622] k8s.go 591: Teardown processing complete. ContainerID="b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659" Feb 9 18:25:08.278929 env[1139]: time="2024-02-09T18:25:08.278886407Z" level=info msg="TearDown network for sandbox \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\" successfully" Feb 9 18:25:08.279007 env[1139]: time="2024-02-09T18:25:08.278990802Z" level=info msg="StopPodSandbox for \"b8d6d7343e49d9effda4ecaaa27a16a9bb7cb8981a00e38f1723fc6998e74659\" returns successfully" Feb 9 18:25:08.279609 env[1139]: time="2024-02-09T18:25:08.279580492Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-6gjdg,Uid:9a5f4c5f-6298-4e37-94ed-b44c042c254a,Namespace:default,Attempt:1,}" Feb 9 18:25:08.313791 systemd[1]: run-netns-cni\x2dbf0c1dab\x2dfd05\x2d32a6\x2d2023\x2d5b19832a88ed.mount: Deactivated successfully. Feb 9 18:25:08.377606 systemd-networkd[1052]: cali0d3e8b479a7: Link UP Feb 9 18:25:08.378980 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:25:08.379070 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0d3e8b479a7: link becomes ready Feb 9 18:25:08.379472 systemd-networkd[1052]: cali0d3e8b479a7: Gained carrier Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.319 [INFO][2639] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0 nginx-deployment-845c78c8b9- default 9a5f4c5f-6298-4e37-94ed-b44c042c254a 964 0 2024-02-09 18:24:52 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.38 nginx-deployment-845c78c8b9-6gjdg eth0 default [] [] [kns.default ksa.default.default] cali0d3e8b479a7 [] []}} ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Namespace="default" Pod="nginx-deployment-845c78c8b9-6gjdg" WorkloadEndpoint="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.319 [INFO][2639] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Namespace="default" Pod="nginx-deployment-845c78c8b9-6gjdg" WorkloadEndpoint="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.340 [INFO][2652] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" HandleID="k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Workload="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.352 [INFO][2652] ipam_plugin.go 268: Auto assigning IP ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" HandleID="k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Workload="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029dab0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.38", "pod":"nginx-deployment-845c78c8b9-6gjdg", "timestamp":"2024-02-09 18:25:08.34014242 +0000 UTC"}, Hostname:"10.0.0.38", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.352 [INFO][2652] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.352 [INFO][2652] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.352 [INFO][2652] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.38' Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.354 [INFO][2652] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.357 [INFO][2652] ipam.go 372: Looking up existing affinities for host host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.361 [INFO][2652] ipam.go 489: Trying affinity for 192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.363 [INFO][2652] ipam.go 155: Attempting to load block cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.364 [INFO][2652] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.365 [INFO][2652] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.64/26 handle="k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.366 [INFO][2652] ipam.go 1682: Creating new handle: k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578 Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.370 [INFO][2652] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.64/26 handle="k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.374 [INFO][2652] ipam.go 1216: Successfully claimed IPs: [192.168.116.66/26] block=192.168.116.64/26 handle="k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.374 [INFO][2652] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.66/26] handle="k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" host="10.0.0.38" Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.374 [INFO][2652] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:25:08.389802 env[1139]: 2024-02-09 18:25:08.374 [INFO][2652] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.66/26] IPv6=[] ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" HandleID="k8s-pod-network.b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Workload="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.390504 env[1139]: 2024-02-09 18:25:08.376 [INFO][2639] k8s.go 385: Populated endpoint ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Namespace="default" Pod="nginx-deployment-845c78c8b9-6gjdg" WorkloadEndpoint="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"9a5f4c5f-6298-4e37-94ed-b44c042c254a", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 24, 52, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-6gjdg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0d3e8b479a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:08.390504 env[1139]: 2024-02-09 18:25:08.376 [INFO][2639] k8s.go 386: Calico CNI using IPs: [192.168.116.66/32] ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Namespace="default" Pod="nginx-deployment-845c78c8b9-6gjdg" WorkloadEndpoint="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.390504 env[1139]: 2024-02-09 18:25:08.376 [INFO][2639] dataplane_linux.go 68: Setting the host side veth name to cali0d3e8b479a7 ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Namespace="default" Pod="nginx-deployment-845c78c8b9-6gjdg" WorkloadEndpoint="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.390504 env[1139]: 2024-02-09 18:25:08.379 [INFO][2639] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Namespace="default" Pod="nginx-deployment-845c78c8b9-6gjdg" WorkloadEndpoint="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.390504 env[1139]: 2024-02-09 18:25:08.379 [INFO][2639] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Namespace="default" Pod="nginx-deployment-845c78c8b9-6gjdg" WorkloadEndpoint="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"9a5f4c5f-6298-4e37-94ed-b44c042c254a", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 24, 52, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578", Pod:"nginx-deployment-845c78c8b9-6gjdg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0d3e8b479a7", MAC:"3e:7d:e1:b1:54:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:08.390504 env[1139]: 2024-02-09 18:25:08.384 [INFO][2639] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578" Namespace="default" Pod="nginx-deployment-845c78c8b9-6gjdg" WorkloadEndpoint="10.0.0.38-k8s-nginx--deployment--845c78c8b9--6gjdg-eth0" Feb 9 18:25:08.400000 audit[2685]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:25:08.400000 audit[2685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=ffffc243bed0 a2=0 a3=ffffa2723fa8 items=0 ppid=2194 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:08.400000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:25:08.402369 env[1139]: time="2024-02-09T18:25:08.402253029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:25:08.402369 env[1139]: time="2024-02-09T18:25:08.402291467Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:25:08.402369 env[1139]: time="2024-02-09T18:25:08.402301627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:25:08.402666 env[1139]: time="2024-02-09T18:25:08.402632490Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578 pid=2687 runtime=io.containerd.runc.v2 Feb 9 18:25:08.416524 systemd[1]: Started cri-containerd-b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578.scope. Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.436000 audit: BPF prog-id=100 op=LOAD Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2687 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:08.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383338313335383430643065363063356138323735633064323963 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2687 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:08.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383338313335383430643065363063356138323735633064323963 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.437000 audit: BPF prog-id=101 op=LOAD Feb 9 18:25:08.437000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2687 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:08.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383338313335383430643065363063356138323735633064323963 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.438000 audit: BPF prog-id=102 op=LOAD Feb 9 18:25:08.438000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2687 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:08.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383338313335383430643065363063356138323735633064323963 Feb 9 18:25:08.439000 audit: BPF prog-id=102 op=UNLOAD Feb 9 18:25:08.439000 audit: BPF prog-id=101 op=UNLOAD Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:08.439000 audit: BPF prog-id=103 op=LOAD Feb 9 18:25:08.439000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2687 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:08.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383338313335383430643065363063356138323735633064323963 Feb 9 18:25:08.440970 systemd-resolved[1091]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:25:08.455524 env[1139]: time="2024-02-09T18:25:08.455487454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-6gjdg,Uid:9a5f4c5f-6298-4e37-94ed-b44c042c254a,Namespace:default,Attempt:1,} returns sandbox id \"b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578\"" Feb 9 18:25:08.457167 env[1139]: time="2024-02-09T18:25:08.457061973Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 18:25:09.129796 kubelet[1441]: E0209 18:25:09.129737 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:09.983505 systemd-networkd[1052]: cali0d3e8b479a7: Gained IPv6LL Feb 9 18:25:10.130192 kubelet[1441]: E0209 18:25:10.130142 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:10.800907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount596327076.mount: Deactivated successfully. Feb 9 18:25:11.131052 kubelet[1441]: E0209 18:25:11.130987 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:11.674998 env[1139]: time="2024-02-09T18:25:11.674948120Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:11.676390 env[1139]: time="2024-02-09T18:25:11.676358218Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:11.678185 env[1139]: time="2024-02-09T18:25:11.678143701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:11.680670 env[1139]: time="2024-02-09T18:25:11.680632992Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:11.681027 env[1139]: time="2024-02-09T18:25:11.681003576Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 18:25:11.682865 env[1139]: time="2024-02-09T18:25:11.682834136Z" level=info msg="CreateContainer within sandbox \"b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 18:25:11.693220 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount669534077.mount: Deactivated successfully. Feb 9 18:25:11.697654 env[1139]: time="2024-02-09T18:25:11.697595454Z" level=info msg="CreateContainer within sandbox \"b1838135840d0e60c5a8275c0d29c37840a63ff3c46fe88619a98145cf6b0578\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3dd13fb774308ce686aa87644ec49da6141163e6bc546769e30098e466f5792d\"" Feb 9 18:25:11.698283 env[1139]: time="2024-02-09T18:25:11.698249106Z" level=info msg="StartContainer for \"3dd13fb774308ce686aa87644ec49da6141163e6bc546769e30098e466f5792d\"" Feb 9 18:25:11.714173 systemd[1]: Started cri-containerd-3dd13fb774308ce686aa87644ec49da6141163e6bc546769e30098e466f5792d.scope. Feb 9 18:25:11.739128 kernel: kauditd_printk_skb: 196 callbacks suppressed Feb 9 18:25:11.739244 kernel: audit: type=1400 audit(1707503111.736:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743122 kernel: audit: type=1400 audit(1707503111.736:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743210 kernel: audit: type=1400 audit(1707503111.736:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.747046 kernel: audit: type=1400 audit(1707503111.736:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.747117 kernel: audit: type=1400 audit(1707503111.736:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.750662 kernel: audit: type=1400 audit(1707503111.736:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.750738 kernel: audit: type=1400 audit(1707503111.736:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.752429 kernel: audit: type=1400 audit(1707503111.736:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.756063 kernel: audit: type=1400 audit(1707503111.736:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.756128 kernel: audit: type=1400 audit(1707503111.737:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.737000 audit: BPF prog-id=104 op=LOAD Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2687 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:11.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643133666237373433303863653638366161383736343465633439 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2687 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:11.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643133666237373433303863653638366161383736343465633439 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.741000 audit: BPF prog-id=105 op=LOAD Feb 9 18:25:11.741000 audit[2729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2687 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:11.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643133666237373433303863653638366161383736343465633439 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit: BPF prog-id=106 op=LOAD Feb 9 18:25:11.743000 audit[2729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2687 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:11.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643133666237373433303863653638366161383736343465633439 Feb 9 18:25:11.743000 audit: BPF prog-id=106 op=UNLOAD Feb 9 18:25:11.743000 audit: BPF prog-id=105 op=UNLOAD Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:11.743000 audit: BPF prog-id=107 op=LOAD Feb 9 18:25:11.743000 audit[2729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2687 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:11.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643133666237373433303863653638366161383736343465633439 Feb 9 18:25:11.768164 env[1139]: time="2024-02-09T18:25:11.768120745Z" level=info msg="StartContainer for \"3dd13fb774308ce686aa87644ec49da6141163e6bc546769e30098e466f5792d\" returns successfully" Feb 9 18:25:12.132357 kubelet[1441]: E0209 18:25:12.132310 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:12.882205 systemd[1]: run-containerd-runc-k8s.io-4375b79e47df5973c464ca48d031e9fe29b25c82609fa9ad6351d2a1bd266a00-runc.pvQQce.mount: Deactivated successfully. Feb 9 18:25:12.949642 kubelet[1441]: E0209 18:25:12.949618 1441 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:25:12.961955 kubelet[1441]: I0209 18:25:12.961873 1441 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-6gjdg" podStartSLOduration=17.737201464 podCreationTimestamp="2024-02-09 18:24:52 +0000 UTC" firstStartedPulling="2024-02-09 18:25:08.456639315 +0000 UTC m=+29.927097618" lastFinishedPulling="2024-02-09 18:25:11.681276204 +0000 UTC m=+33.151734507" observedRunningTime="2024-02-09 18:25:12.289091048 +0000 UTC m=+33.759549351" watchObservedRunningTime="2024-02-09 18:25:12.961838353 +0000 UTC m=+34.432296656" Feb 9 18:25:13.133065 kubelet[1441]: E0209 18:25:13.132975 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:14.133692 kubelet[1441]: E0209 18:25:14.133652 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:14.574000 audit[2807]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:14.574000 audit[2807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffff144d370 a2=0 a3=ffff986636c0 items=0 ppid=1647 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:14.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:14.575000 audit[2807]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:14.575000 audit[2807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff144d370 a2=0 a3=ffff986636c0 items=0 ppid=1647 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:14.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:14.589000 audit[2809]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:14.589000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffdf267d10 a2=0 a3=ffffacb4f6c0 items=0 ppid=1647 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:14.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:14.599000 audit[2809]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:14.599000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffdf267d10 a2=0 a3=ffffacb4f6c0 items=0 ppid=1647 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:14.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:14.618786 kubelet[1441]: I0209 18:25:14.618661 1441 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:25:14.623144 systemd[1]: Created slice kubepods-besteffort-pod88d776e0_3a93_4d10_8ee8_b1be48005156.slice. Feb 9 18:25:14.699297 kubelet[1441]: I0209 18:25:14.699225 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sr758\" (UniqueName: \"kubernetes.io/projected/88d776e0-3a93-4d10-8ee8-b1be48005156-kube-api-access-sr758\") pod \"nfs-server-provisioner-0\" (UID: \"88d776e0-3a93-4d10-8ee8-b1be48005156\") " pod="default/nfs-server-provisioner-0" Feb 9 18:25:14.699426 kubelet[1441]: I0209 18:25:14.699327 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/88d776e0-3a93-4d10-8ee8-b1be48005156-data\") pod \"nfs-server-provisioner-0\" (UID: \"88d776e0-3a93-4d10-8ee8-b1be48005156\") " pod="default/nfs-server-provisioner-0" Feb 9 18:25:14.925370 env[1139]: time="2024-02-09T18:25:14.925262921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:88d776e0-3a93-4d10-8ee8-b1be48005156,Namespace:default,Attempt:0,}" Feb 9 18:25:15.048582 systemd-networkd[1052]: cali60e51b789ff: Link UP Feb 9 18:25:15.050448 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:25:15.050493 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 18:25:15.050648 systemd-networkd[1052]: cali60e51b789ff: Gained carrier Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:14.969 [INFO][2811] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.38-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 88d776e0-3a93-4d10-8ee8-b1be48005156 1013 0 2024-02-09 18:25:14 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.38 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.38-k8s-nfs--server--provisioner--0-" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:14.970 [INFO][2811] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:14.996 [INFO][2825] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" HandleID="k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Workload="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.010 [INFO][2825] ipam_plugin.go 268: Auto assigning IP ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" HandleID="k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Workload="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40006133b0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.38", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 18:25:14.996321128 +0000 UTC"}, Hostname:"10.0.0.38", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.011 [INFO][2825] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.011 [INFO][2825] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.011 [INFO][2825] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.38' Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.013 [INFO][2825] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.019 [INFO][2825] ipam.go 372: Looking up existing affinities for host host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.023 [INFO][2825] ipam.go 489: Trying affinity for 192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.026 [INFO][2825] ipam.go 155: Attempting to load block cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.029 [INFO][2825] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.029 [INFO][2825] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.64/26 handle="k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.032 [INFO][2825] ipam.go 1682: Creating new handle: k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5 Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.036 [INFO][2825] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.64/26 handle="k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.041 [INFO][2825] ipam.go 1216: Successfully claimed IPs: [192.168.116.67/26] block=192.168.116.64/26 handle="k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.041 [INFO][2825] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.67/26] handle="k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" host="10.0.0.38" Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.041 [INFO][2825] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:25:15.064293 env[1139]: 2024-02-09 18:25:15.041 [INFO][2825] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.67/26] IPv6=[] ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" HandleID="k8s-pod-network.7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Workload="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:25:15.064941 env[1139]: 2024-02-09 18:25:15.045 [INFO][2811] k8s.go 385: Populated endpoint ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"88d776e0-3a93-4d10-8ee8-b1be48005156", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 25, 14, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.116.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:15.064941 env[1139]: 2024-02-09 18:25:15.045 [INFO][2811] k8s.go 386: Calico CNI using IPs: [192.168.116.67/32] ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:25:15.064941 env[1139]: 2024-02-09 18:25:15.045 [INFO][2811] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:25:15.064941 env[1139]: 2024-02-09 18:25:15.050 [INFO][2811] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:25:15.065076 env[1139]: 2024-02-09 18:25:15.051 [INFO][2811] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"88d776e0-3a93-4d10-8ee8-b1be48005156", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 25, 14, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.116.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1a:db:6a:8e:57:1b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:15.065076 env[1139]: 2024-02-09 18:25:15.060 [INFO][2811] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.38-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:25:15.075000 audit[2851]: NETFILTER_CFG table=filter:79 family=2 entries=44 op=nft_register_chain pid=2851 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:25:15.075000 audit[2851]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22352 a0=3 a1=ffffd49e39d0 a2=0 a3=ffffb667ffa8 items=0 ppid=2194 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:15.075000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:25:15.079030 env[1139]: time="2024-02-09T18:25:15.078367313Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:25:15.079030 env[1139]: time="2024-02-09T18:25:15.078433390Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:25:15.079030 env[1139]: time="2024-02-09T18:25:15.078473189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:25:15.079030 env[1139]: time="2024-02-09T18:25:15.078685261Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5 pid=2858 runtime=io.containerd.runc.v2 Feb 9 18:25:15.094822 systemd[1]: Started cri-containerd-7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5.scope. Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.117000 audit: BPF prog-id=108 op=LOAD Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:15.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396464666266383466323364373366366165373865323735373830 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:15.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396464666266383466323364373366366165373865323735373830 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit: BPF prog-id=109 op=LOAD Feb 9 18:25:15.118000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:15.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396464666266383466323364373366366165373865323735373830 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.118000 audit: BPF prog-id=110 op=LOAD Feb 9 18:25:15.118000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:15.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396464666266383466323364373366366165373865323735373830 Feb 9 18:25:15.119000 audit: BPF prog-id=110 op=UNLOAD Feb 9 18:25:15.119000 audit: BPF prog-id=109 op=UNLOAD Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:15.119000 audit: BPF prog-id=111 op=LOAD Feb 9 18:25:15.119000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:15.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396464666266383466323364373366366165373865323735373830 Feb 9 18:25:15.121538 systemd-resolved[1091]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:25:15.133921 kubelet[1441]: E0209 18:25:15.133866 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:15.142820 env[1139]: time="2024-02-09T18:25:15.142717770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:88d776e0-3a93-4d10-8ee8-b1be48005156,Namespace:default,Attempt:0,} returns sandbox id \"7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5\"" Feb 9 18:25:15.144378 env[1139]: time="2024-02-09T18:25:15.144349833Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 18:25:16.134745 kubelet[1441]: E0209 18:25:16.134707 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:16.703064 systemd-networkd[1052]: cali60e51b789ff: Gained IPv6LL Feb 9 18:25:17.134916 kubelet[1441]: E0209 18:25:17.134867 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:17.207339 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3476755761.mount: Deactivated successfully. Feb 9 18:25:17.978157 update_engine[1130]: I0209 18:25:17.977799 1130 update_attempter.cc:509] Updating boot flags... Feb 9 18:25:18.135080 kubelet[1441]: E0209 18:25:18.135027 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:18.921798 env[1139]: time="2024-02-09T18:25:18.921699069Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:18.923377 env[1139]: time="2024-02-09T18:25:18.923352659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:18.925137 env[1139]: time="2024-02-09T18:25:18.925108326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:18.926846 env[1139]: time="2024-02-09T18:25:18.926818754Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:18.927637 env[1139]: time="2024-02-09T18:25:18.927608131Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 9 18:25:18.929710 env[1139]: time="2024-02-09T18:25:18.929665629Z" level=info msg="CreateContainer within sandbox \"7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 18:25:18.937533 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount107892005.mount: Deactivated successfully. Feb 9 18:25:18.941092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2870069049.mount: Deactivated successfully. Feb 9 18:25:18.943473 env[1139]: time="2024-02-09T18:25:18.943412534Z" level=info msg="CreateContainer within sandbox \"7f9ddfbf84f23d73f6ae78e27578067d5e8eccd24f085c88c17e4d233d8212c5\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"e87ceac756e745a73b2ff07fed5fb2f2f90abbf51dd9729c17c2f4ce94c6a917\"" Feb 9 18:25:18.944034 env[1139]: time="2024-02-09T18:25:18.944005276Z" level=info msg="StartContainer for \"e87ceac756e745a73b2ff07fed5fb2f2f90abbf51dd9729c17c2f4ce94c6a917\"" Feb 9 18:25:18.958134 systemd[1]: Started cri-containerd-e87ceac756e745a73b2ff07fed5fb2f2f90abbf51dd9729c17c2f4ce94c6a917.scope. Feb 9 18:25:18.988146 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 9 18:25:18.988231 kernel: audit: type=1400 audit(1707503118.986:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.991378 kernel: audit: type=1400 audit(1707503118.986:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.991436 kernel: audit: type=1400 audit(1707503118.986:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.993130 kernel: audit: type=1400 audit(1707503118.986:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.996707 kernel: audit: type=1400 audit(1707503118.986:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.996741 kernel: audit: type=1400 audit(1707503118.986:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.000322 kernel: audit: type=1400 audit(1707503118.986:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.000367 kernel: audit: type=1400 audit(1707503118.986:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.003892 kernel: audit: type=1400 audit(1707503118.986:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.003931 kernel: audit: type=1400 audit(1707503118.987:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.987000 audit: BPF prog-id=112 op=LOAD Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2858 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:18.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376365616337353665373435613733623266663037666564356662 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2858 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:18.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376365616337353665373435613733623266663037666564356662 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.990000 audit: BPF prog-id=113 op=LOAD Feb 9 18:25:18.990000 audit[2921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2858 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:18.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376365616337353665373435613733623266663037666564356662 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.992000 audit: BPF prog-id=114 op=LOAD Feb 9 18:25:18.992000 audit[2921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2858 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:18.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376365616337353665373435613733623266663037666564356662 Feb 9 18:25:18.994000 audit: BPF prog-id=114 op=UNLOAD Feb 9 18:25:18.994000 audit: BPF prog-id=113 op=UNLOAD Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { perfmon } for pid=2921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit[2921]: AVC avc: denied { bpf } for pid=2921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:18.994000 audit: BPF prog-id=115 op=LOAD Feb 9 18:25:18.994000 audit[2921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2858 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:18.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376365616337353665373435613733623266663037666564356662 Feb 9 18:25:19.026826 env[1139]: time="2024-02-09T18:25:19.023947659Z" level=info msg="StartContainer for \"e87ceac756e745a73b2ff07fed5fb2f2f90abbf51dd9729c17c2f4ce94c6a917\" returns successfully" Feb 9 18:25:19.066000 audit[2952]: NETFILTER_CFG table=filter:80 family=2 entries=33 op=nft_register_rule pid=2952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:19.066000 audit[2952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffcdc29be0 a2=0 a3=ffff84a256c0 items=0 ppid=1647 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:19.067000 audit[2952]: NETFILTER_CFG table=nat:81 family=2 entries=20 op=nft_register_rule pid=2952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:19.067000 audit[2952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcdc29be0 a2=0 a3=ffff84a256c0 items=0 ppid=1647 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:19.080628 kubelet[1441]: I0209 18:25:19.080205 1441 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:25:19.081000 audit[2954]: NETFILTER_CFG table=filter:82 family=2 entries=34 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:19.081000 audit[2954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffef5032b0 a2=0 a3=ffffb9bef6c0 items=0 ppid=1647 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:19.085455 systemd[1]: Created slice kubepods-besteffort-podeaa22c5e_4929_4f50_82be_0798c9c08d78.slice. Feb 9 18:25:19.085000 audit[2954]: NETFILTER_CFG table=nat:83 family=2 entries=20 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:19.085000 audit[2954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffef5032b0 a2=0 a3=ffffb9bef6c0 items=0 ppid=1647 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:19.109736 kubelet[1441]: E0209 18:25:19.109703 1441 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:19.128990 kubelet[1441]: I0209 18:25:19.128949 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/eaa22c5e-4929-4f50-82be-0798c9c08d78-calico-apiserver-certs\") pod \"calico-apiserver-64df6fb9d6-fdtpd\" (UID: \"eaa22c5e-4929-4f50-82be-0798c9c08d78\") " pod="calico-apiserver/calico-apiserver-64df6fb9d6-fdtpd" Feb 9 18:25:19.129116 kubelet[1441]: I0209 18:25:19.129037 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mc9tl\" (UniqueName: \"kubernetes.io/projected/eaa22c5e-4929-4f50-82be-0798c9c08d78-kube-api-access-mc9tl\") pod \"calico-apiserver-64df6fb9d6-fdtpd\" (UID: \"eaa22c5e-4929-4f50-82be-0798c9c08d78\") " pod="calico-apiserver/calico-apiserver-64df6fb9d6-fdtpd" Feb 9 18:25:19.132000 audit[2955]: AVC avc: denied { search } for pid=2955 comm="rpcbind" name="crypto" dev="proc" ino=16026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:25:19.132000 audit[2955]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb124f000 a2=0 a3=0 items=0 ppid=2932 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 key=(null) Feb 9 18:25:19.132000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 18:25:19.136035 kubelet[1441]: E0209 18:25:19.136015 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:19.177000 audit[2960]: AVC avc: denied { search } for pid=2960 comm="dbus-daemon" name="crypto" dev="proc" ino=16026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:25:19.177000 audit[2960]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8874f000 a2=0 a3=0 items=0 ppid=2932 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 key=(null) Feb 9 18:25:19.177000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 18:25:19.188000 audit[2961]: AVC avc: denied { watch } for pid=2961 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537947 scontext=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c600,c709 tclass=dir permissive=0 Feb 9 18:25:19.188000 audit[2961]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf46cf550 a2=2c8 a3=aaaaf46bda60 items=0 ppid=2932 pid=2961 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 key=(null) Feb 9 18:25:19.188000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 18:25:19.193000 audit[2962]: AVC avc: denied { read } for pid=2962 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 18:25:19.193000 audit[2962]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb72ba570 a2=80000 a3=0 items=0 ppid=2932 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 key=(null) Feb 9 18:25:19.193000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 18:25:19.193000 audit[2962]: AVC avc: denied { search } for pid=2962 comm="ganesha.nfsd" name="crypto" dev="proc" ino=16026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:25:19.193000 audit[2962]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb664f000 a2=0 a3=0 items=0 ppid=2932 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c600,c709 key=(null) Feb 9 18:25:19.193000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 18:25:19.305016 kubelet[1441]: I0209 18:25:19.304967 1441 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.520888003 podCreationTimestamp="2024-02-09 18:25:14 +0000 UTC" firstStartedPulling="2024-02-09 18:25:15.143917048 +0000 UTC m=+36.614375351" lastFinishedPulling="2024-02-09 18:25:18.92795776 +0000 UTC m=+40.398416063" observedRunningTime="2024-02-09 18:25:19.304008581 +0000 UTC m=+40.774466844" watchObservedRunningTime="2024-02-09 18:25:19.304928715 +0000 UTC m=+40.775387018" Feb 9 18:25:19.387847 env[1139]: time="2024-02-09T18:25:19.387806496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64df6fb9d6-fdtpd,Uid:eaa22c5e-4929-4f50-82be-0798c9c08d78,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:25:19.552893 systemd-networkd[1052]: cali2586c830d05: Link UP Feb 9 18:25:19.554317 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:25:19.554467 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2586c830d05: link becomes ready Feb 9 18:25:19.554618 systemd-networkd[1052]: cali2586c830d05: Gained carrier Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.467 [INFO][2984] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0 calico-apiserver-64df6fb9d6- calico-apiserver eaa22c5e-4929-4f50-82be-0798c9c08d78 1081 0 2024-02-09 18:25:19 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64df6fb9d6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.38 calico-apiserver-64df6fb9d6-fdtpd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2586c830d05 [] []}} ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Namespace="calico-apiserver" Pod="calico-apiserver-64df6fb9d6-fdtpd" WorkloadEndpoint="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.467 [INFO][2984] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Namespace="calico-apiserver" Pod="calico-apiserver-64df6fb9d6-fdtpd" WorkloadEndpoint="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.495 [INFO][2997] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" HandleID="k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Workload="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.509 [INFO][2997] ipam_plugin.go 268: Auto assigning IP ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" HandleID="k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Workload="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cde40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.38", "pod":"calico-apiserver-64df6fb9d6-fdtpd", "timestamp":"2024-02-09 18:25:19.495523244 +0000 UTC"}, Hostname:"10.0.0.38", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.509 [INFO][2997] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.509 [INFO][2997] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.509 [INFO][2997] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.38' Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.511 [INFO][2997] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.522 [INFO][2997] ipam.go 372: Looking up existing affinities for host host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.528 [INFO][2997] ipam.go 489: Trying affinity for 192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.532 [INFO][2997] ipam.go 155: Attempting to load block cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.535 [INFO][2997] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.535 [INFO][2997] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.64/26 handle="k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.537 [INFO][2997] ipam.go 1682: Creating new handle: k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17 Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.543 [INFO][2997] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.64/26 handle="k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.549 [INFO][2997] ipam.go 1216: Successfully claimed IPs: [192.168.116.68/26] block=192.168.116.64/26 handle="k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.549 [INFO][2997] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.68/26] handle="k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" host="10.0.0.38" Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.549 [INFO][2997] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:25:19.564253 env[1139]: 2024-02-09 18:25:19.549 [INFO][2997] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.68/26] IPv6=[] ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" HandleID="k8s-pod-network.3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Workload="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" Feb 9 18:25:19.564905 env[1139]: 2024-02-09 18:25:19.550 [INFO][2984] k8s.go 385: Populated endpoint ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Namespace="calico-apiserver" Pod="calico-apiserver-64df6fb9d6-fdtpd" WorkloadEndpoint="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0", GenerateName:"calico-apiserver-64df6fb9d6-", Namespace:"calico-apiserver", SelfLink:"", UID:"eaa22c5e-4929-4f50-82be-0798c9c08d78", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 25, 19, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64df6fb9d6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"", Pod:"calico-apiserver-64df6fb9d6-fdtpd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.116.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2586c830d05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:19.564905 env[1139]: 2024-02-09 18:25:19.551 [INFO][2984] k8s.go 386: Calico CNI using IPs: [192.168.116.68/32] ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Namespace="calico-apiserver" Pod="calico-apiserver-64df6fb9d6-fdtpd" WorkloadEndpoint="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" Feb 9 18:25:19.564905 env[1139]: 2024-02-09 18:25:19.551 [INFO][2984] dataplane_linux.go 68: Setting the host side veth name to cali2586c830d05 ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Namespace="calico-apiserver" Pod="calico-apiserver-64df6fb9d6-fdtpd" WorkloadEndpoint="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" Feb 9 18:25:19.564905 env[1139]: 2024-02-09 18:25:19.554 [INFO][2984] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Namespace="calico-apiserver" Pod="calico-apiserver-64df6fb9d6-fdtpd" WorkloadEndpoint="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" Feb 9 18:25:19.564905 env[1139]: 2024-02-09 18:25:19.554 [INFO][2984] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Namespace="calico-apiserver" Pod="calico-apiserver-64df6fb9d6-fdtpd" WorkloadEndpoint="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0", GenerateName:"calico-apiserver-64df6fb9d6-", Namespace:"calico-apiserver", SelfLink:"", UID:"eaa22c5e-4929-4f50-82be-0798c9c08d78", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 25, 19, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64df6fb9d6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17", Pod:"calico-apiserver-64df6fb9d6-fdtpd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.116.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2586c830d05", MAC:"62:22:29:aa:86:a7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:19.564905 env[1139]: 2024-02-09 18:25:19.563 [INFO][2984] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17" Namespace="calico-apiserver" Pod="calico-apiserver-64df6fb9d6-fdtpd" WorkloadEndpoint="10.0.0.38-k8s-calico--apiserver--64df6fb9d6--fdtpd-eth0" Feb 9 18:25:19.581434 env[1139]: time="2024-02-09T18:25:19.581337182Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:25:19.581434 env[1139]: time="2024-02-09T18:25:19.581389060Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:25:19.581434 env[1139]: time="2024-02-09T18:25:19.581399860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:25:19.581876 env[1139]: time="2024-02-09T18:25:19.581833087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17 pid=3028 runtime=io.containerd.runc.v2 Feb 9 18:25:19.582000 audit[3035]: NETFILTER_CFG table=filter:84 family=2 entries=51 op=nft_register_chain pid=3035 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:25:19.582000 audit[3035]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26900 a0=3 a1=ffffd8fef830 a2=0 a3=ffff95b45fa8 items=0 ppid=2194 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:25:19.594505 systemd[1]: Started cri-containerd-3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17.scope. Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.618000 audit: BPF prog-id=116 op=LOAD Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653235323034353463616133626238323639616139356164633635 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653235323034353463616133626238323639616139356164633635 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit: BPF prog-id=117 op=LOAD Feb 9 18:25:19.619000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653235323034353463616133626238323639616139356164633635 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit: BPF prog-id=118 op=LOAD Feb 9 18:25:19.619000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653235323034353463616133626238323639616139356164633635 Feb 9 18:25:19.619000 audit: BPF prog-id=118 op=UNLOAD Feb 9 18:25:19.619000 audit: BPF prog-id=117 op=UNLOAD Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:19.619000 audit: BPF prog-id=119 op=LOAD Feb 9 18:25:19.619000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:19.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653235323034353463616133626238323639616139356164633635 Feb 9 18:25:19.621421 systemd-resolved[1091]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:25:19.636696 env[1139]: time="2024-02-09T18:25:19.636654714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64df6fb9d6-fdtpd,Uid:eaa22c5e-4929-4f50-82be-0798c9c08d78,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17\"" Feb 9 18:25:19.638064 env[1139]: time="2024-02-09T18:25:19.638039634Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:25:20.097000 audit[3066]: NETFILTER_CFG table=filter:85 family=2 entries=22 op=nft_register_rule pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:20.097000 audit[3066]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffea677920 a2=0 a3=ffff870ac6c0 items=0 ppid=1647 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:20.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:20.099000 audit[3066]: NETFILTER_CFG table=nat:86 family=2 entries=104 op=nft_register_chain pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:20.099000 audit[3066]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffea677920 a2=0 a3=ffff870ac6c0 items=0 ppid=1647 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:20.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:20.137032 kubelet[1441]: E0209 18:25:20.136992 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:20.798977 systemd-networkd[1052]: cali2586c830d05: Gained IPv6LL Feb 9 18:25:21.138116 kubelet[1441]: E0209 18:25:21.138066 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:21.917326 env[1139]: time="2024-02-09T18:25:21.917282575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:21.918480 env[1139]: time="2024-02-09T18:25:21.918420385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:21.919816 env[1139]: time="2024-02-09T18:25:21.919786950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:21.921122 env[1139]: time="2024-02-09T18:25:21.921085316Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:21.921803 env[1139]: time="2024-02-09T18:25:21.921772338Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 18:25:21.923646 env[1139]: time="2024-02-09T18:25:21.923614610Z" level=info msg="CreateContainer within sandbox \"3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:25:21.932292 env[1139]: time="2024-02-09T18:25:21.932242705Z" level=info msg="CreateContainer within sandbox \"3ce2520454caa3bb8269aa95adc6590315259a5109b64ddf1ac9bb0728e47f17\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"330bfe345dd57c7204b71d1817a9ddced4d3a88b893cff2baf6ed476f96e1b1a\"" Feb 9 18:25:21.932921 env[1139]: time="2024-02-09T18:25:21.932880689Z" level=info msg="StartContainer for \"330bfe345dd57c7204b71d1817a9ddced4d3a88b893cff2baf6ed476f96e1b1a\"" Feb 9 18:25:21.952530 systemd[1]: run-containerd-runc-k8s.io-330bfe345dd57c7204b71d1817a9ddced4d3a88b893cff2baf6ed476f96e1b1a-runc.FMC6wX.mount: Deactivated successfully. Feb 9 18:25:21.953998 systemd[1]: Started cri-containerd-330bfe345dd57c7204b71d1817a9ddced4d3a88b893cff2baf6ed476f96e1b1a.scope. Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit: BPF prog-id=120 op=LOAD Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3028 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306266653334356464353763373230346237316431383137613964 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3028 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306266653334356464353763373230346237316431383137613964 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.000000 audit: BPF prog-id=121 op=LOAD Feb 9 18:25:22.000000 audit[3077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3028 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306266653334356464353763373230346237316431383137613964 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit: BPF prog-id=122 op=LOAD Feb 9 18:25:22.001000 audit[3077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3028 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306266653334356464353763373230346237316431383137613964 Feb 9 18:25:22.001000 audit: BPF prog-id=122 op=UNLOAD Feb 9 18:25:22.001000 audit: BPF prog-id=121 op=UNLOAD Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:22.001000 audit: BPF prog-id=123 op=LOAD Feb 9 18:25:22.001000 audit[3077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3028 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306266653334356464353763373230346237316431383137613964 Feb 9 18:25:22.031193 env[1139]: time="2024-02-09T18:25:22.031146326Z" level=info msg="StartContainer for \"330bfe345dd57c7204b71d1817a9ddced4d3a88b893cff2baf6ed476f96e1b1a\" returns successfully" Feb 9 18:25:22.138241 kubelet[1441]: E0209 18:25:22.138190 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:22.313577 kubelet[1441]: I0209 18:25:22.313296 1441 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64df6fb9d6-fdtpd" podStartSLOduration=1.029022389 podCreationTimestamp="2024-02-09 18:25:19 +0000 UTC" firstStartedPulling="2024-02-09 18:25:19.637769842 +0000 UTC m=+41.108228145" lastFinishedPulling="2024-02-09 18:25:21.922008732 +0000 UTC m=+43.392467035" observedRunningTime="2024-02-09 18:25:22.311766316 +0000 UTC m=+43.782224619" watchObservedRunningTime="2024-02-09 18:25:22.313261279 +0000 UTC m=+43.783719582" Feb 9 18:25:22.322000 audit[3109]: NETFILTER_CFG table=filter:87 family=2 entries=10 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:22.322000 audit[3109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc0162870 a2=0 a3=ffffba1a76c0 items=0 ppid=1647 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.322000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:22.323000 audit[3109]: NETFILTER_CFG table=nat:88 family=2 entries=44 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:22.323000 audit[3109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffc0162870 a2=0 a3=ffffba1a76c0 items=0 ppid=1647 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:22.574000 audit[3111]: NETFILTER_CFG table=filter:89 family=2 entries=10 op=nft_register_rule pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:22.574000 audit[3111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcd729770 a2=0 a3=ffff94f586c0 items=0 ppid=1647 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:22.575000 audit[3111]: NETFILTER_CFG table=nat:90 family=2 entries=44 op=nft_register_rule pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:25:22.575000 audit[3111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffcd729770 a2=0 a3=ffff94f586c0 items=0 ppid=1647 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:22.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:25:23.140140 kubelet[1441]: E0209 18:25:23.140092 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:23.391000 audit[3088]: AVC avc: denied { watch } for pid=3088 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_25_19.1029695691/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c586 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c284,c586 tclass=file permissive=0 Feb 9 18:25:23.391000 audit[3088]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a8e060 a2=fc6 a3=0 items=0 ppid=3028 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c586 key=(null) Feb 9 18:25:23.391000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:25:24.140287 kubelet[1441]: E0209 18:25:24.140231 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:25.140972 kubelet[1441]: E0209 18:25:25.140928 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:26.142073 kubelet[1441]: E0209 18:25:26.142018 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:27.142521 kubelet[1441]: E0209 18:25:27.142471 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:28.142862 kubelet[1441]: E0209 18:25:28.142820 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:28.519966 kubelet[1441]: I0209 18:25:28.519550 1441 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:25:28.525235 systemd[1]: Created slice kubepods-besteffort-podd3bf8e20_c440_4159_a96b_265378f5bf9d.slice. Feb 9 18:25:28.694121 kubelet[1441]: I0209 18:25:28.694055 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-07ba13c7-95f7-48b8-91d1-b638776e2cb4\" (UniqueName: \"kubernetes.io/nfs/d3bf8e20-c440-4159-a96b-265378f5bf9d-pvc-07ba13c7-95f7-48b8-91d1-b638776e2cb4\") pod \"test-pod-1\" (UID: \"d3bf8e20-c440-4159-a96b-265378f5bf9d\") " pod="default/test-pod-1" Feb 9 18:25:28.694121 kubelet[1441]: I0209 18:25:28.694102 1441 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pd8kg\" (UniqueName: \"kubernetes.io/projected/d3bf8e20-c440-4159-a96b-265378f5bf9d-kube-api-access-pd8kg\") pod \"test-pod-1\" (UID: \"d3bf8e20-c440-4159-a96b-265378f5bf9d\") " pod="default/test-pod-1" Feb 9 18:25:28.810000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.815505 kernel: Failed to create system directory netfs Feb 9 18:25:28.815581 kernel: kauditd_printk_skb: 212 callbacks suppressed Feb 9 18:25:28.815602 kernel: audit: type=1400 audit(1707503128.810:856): avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.815624 kernel: Failed to create system directory netfs Feb 9 18:25:28.815637 kernel: audit: type=1400 audit(1707503128.810:856): avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.810000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.821851 kernel: Failed to create system directory netfs Feb 9 18:25:28.821928 kernel: audit: type=1400 audit(1707503128.810:856): avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.821963 kernel: Failed to create system directory netfs Feb 9 18:25:28.821980 kernel: audit: type=1400 audit(1707503128.810:856): avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.810000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.810000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.810000 audit[3118]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab164fe5e0 a1=12c14 a2=aaaae129e028 a3=aaab164ef010 items=0 ppid=1079 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:28.826689 kernel: audit: type=1300 audit(1707503128.810:856): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab164fe5e0 a1=12c14 a2=aaaae129e028 a3=aaab164ef010 items=0 ppid=1079 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:28.826746 kernel: audit: type=1327 audit(1707503128.810:856): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:25:28.810000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.832658 kernel: Failed to create system directory fscache Feb 9 18:25:28.832721 kernel: audit: type=1400 audit(1707503128.827:857): avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.832761 kernel: Failed to create system directory fscache Feb 9 18:25:28.832786 kernel: audit: type=1400 audit(1707503128.827:857): avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.833710 kernel: Failed to create system directory fscache Feb 9 18:25:28.834846 kernel: audit: type=1400 audit(1707503128.827:857): avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.837061 kernel: Failed to create system directory fscache Feb 9 18:25:28.837122 kernel: audit: type=1400 audit(1707503128.827:857): avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.839288 kernel: Failed to create system directory fscache Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.839763 kernel: Failed to create system directory fscache Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.841181 kernel: Failed to create system directory fscache Feb 9 18:25:28.841233 kernel: Failed to create system directory fscache Feb 9 18:25:28.841260 kernel: Failed to create system directory fscache Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.842194 kernel: Failed to create system directory fscache Feb 9 18:25:28.842228 kernel: Failed to create system directory fscache Feb 9 18:25:28.842246 kernel: Failed to create system directory fscache Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.843023 kernel: Failed to create system directory fscache Feb 9 18:25:28.843076 kernel: Failed to create system directory fscache Feb 9 18:25:28.827000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.843850 kernel: FS-Cache: Loaded Feb 9 18:25:28.827000 audit[3118]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab16711210 a1=4c344 a2=aaaae129e028 a3=aaab164ef010 items=0 ppid=1079 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:28.827000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.863004 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.863035 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.863060 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.863086 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.863144 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.863799 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.863838 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.865006 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.865036 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.865059 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.866222 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.866268 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.866292 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.867047 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.867082 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.867766 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.867796 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.868945 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.868968 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.868990 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.870145 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.870177 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.870195 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.870991 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.871027 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.872152 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.872185 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.872203 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.873009 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.873037 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.874151 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.874175 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.874198 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.875004 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.875033 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.876144 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.876174 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.876192 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.877023 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.877075 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.877803 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.877830 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.878953 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.879013 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.879027 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.880251 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.880289 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.880313 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.880940 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.880989 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.882134 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.882211 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.882236 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.882996 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.883035 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.884126 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.884157 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.884174 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.884970 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.884999 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.886107 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.886131 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.886155 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.886959 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.886997 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.888130 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.888160 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.888174 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.889018 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.889052 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.889767 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.889800 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.891026 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.891063 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.891080 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.891902 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.891930 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.893154 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.893187 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.893201 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.893880 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.893905 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.895237 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.895302 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.895323 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.896020 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.896064 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.897259 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.897291 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.897304 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.898044 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.898076 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.898853 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.898877 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.900082 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.900107 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.900129 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.900961 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.901001 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.902136 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.902161 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.902181 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.903013 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.903059 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.903759 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.903781 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.904977 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.905001 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.905026 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.905853 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.905883 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.907027 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.907060 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.907076 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.907933 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.907964 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.909094 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.909137 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.909154 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.909976 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.910004 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.911147 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.911169 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.911181 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.911965 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.912021 kernel: Failed to create system directory sunrpc Feb 9 18:25:28.855000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.916859 kernel: RPC: Registered named UNIX socket transport module. Feb 9 18:25:28.916928 kernel: RPC: Registered udp transport module. Feb 9 18:25:28.916952 kernel: RPC: Registered tcp transport module. Feb 9 18:25:28.917944 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 18:25:28.855000 audit[3118]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1675d560 a1=fbb6c a2=aaaae129e028 a3=aaab164ef010 items=6 ppid=1079 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:28.855000 audit: CWD cwd="/" Feb 9 18:25:28.855000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:25:28.855000 audit: PATH item=1 name=(null) inode=20559 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:25:28.855000 audit: PATH item=2 name=(null) inode=20559 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:25:28.855000 audit: PATH item=3 name=(null) inode=20560 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:25:28.855000 audit: PATH item=4 name=(null) inode=20559 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:25:28.855000 audit: PATH item=5 name=(null) inode=20561 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:25:28.855000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.942162 kernel: Failed to create system directory nfs Feb 9 18:25:28.942219 kernel: Failed to create system directory nfs Feb 9 18:25:28.942249 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.942910 kernel: Failed to create system directory nfs Feb 9 18:25:28.942940 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.944218 kernel: Failed to create system directory nfs Feb 9 18:25:28.944284 kernel: Failed to create system directory nfs Feb 9 18:25:28.944305 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.945165 kernel: Failed to create system directory nfs Feb 9 18:25:28.945210 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.945878 kernel: Failed to create system directory nfs Feb 9 18:25:28.946560 kernel: Failed to create system directory nfs Feb 9 18:25:28.946598 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.947716 kernel: Failed to create system directory nfs Feb 9 18:25:28.947775 kernel: Failed to create system directory nfs Feb 9 18:25:28.947837 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.948128 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.949166 kernel: Failed to create system directory nfs Feb 9 18:25:28.949348 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.950021 kernel: Failed to create system directory nfs Feb 9 18:25:28.950071 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.950924 kernel: Failed to create system directory nfs Feb 9 18:25:28.950953 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.952057 kernel: Failed to create system directory nfs Feb 9 18:25:28.952114 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.953045 kernel: Failed to create system directory nfs Feb 9 18:25:28.953097 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.954015 kernel: Failed to create system directory nfs Feb 9 18:25:28.954090 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.955020 kernel: Failed to create system directory nfs Feb 9 18:25:28.955248 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.956131 kernel: Failed to create system directory nfs Feb 9 18:25:28.956176 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.957167 kernel: Failed to create system directory nfs Feb 9 18:25:28.957223 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.958337 kernel: Failed to create system directory nfs Feb 9 18:25:28.958404 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.959947 kernel: Failed to create system directory nfs Feb 9 18:25:28.960007 kernel: Failed to create system directory nfs Feb 9 18:25:28.960058 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.960942 kernel: Failed to create system directory nfs Feb 9 18:25:28.961016 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.962030 kernel: Failed to create system directory nfs Feb 9 18:25:28.962097 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.963139 kernel: Failed to create system directory nfs Feb 9 18:25:28.963319 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.964111 kernel: Failed to create system directory nfs Feb 9 18:25:28.964416 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.964990 kernel: Failed to create system directory nfs Feb 9 18:25:28.966265 kernel: Failed to create system directory nfs Feb 9 18:25:28.966304 kernel: Failed to create system directory nfs Feb 9 18:25:28.966321 kernel: Failed to create system directory nfs Feb 9 18:25:28.966335 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.967400 kernel: Failed to create system directory nfs Feb 9 18:25:28.967444 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.968203 kernel: Failed to create system directory nfs Feb 9 18:25:28.968564 kernel: Failed to create system directory nfs Feb 9 18:25:28.968814 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.969500 kernel: Failed to create system directory nfs Feb 9 18:25:28.935000 audit[3118]: AVC avc: denied { confidentiality } for pid=3118 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.978765 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 18:25:28.935000 audit[3118]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab16889b40 a1=ae35c a2=aaaae129e028 a3=aaab164ef010 items=0 ppid=1079 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:28.935000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.004056 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.004164 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.005094 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.005160 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.006150 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.006850 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.006890 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.008153 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.008234 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.008259 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.009005 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.009066 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.009929 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.009960 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.011126 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.011183 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.011210 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.011959 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.012005 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.012785 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.012845 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.014085 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.014116 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.014135 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.014959 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.015015 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.015834 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.015886 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.017140 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.017201 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.017224 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.018003 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.018867 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.018923 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.018942 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.020170 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.020236 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.020257 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.021048 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.021106 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.021925 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.021970 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.022792 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.022836 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.024074 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.024130 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.024152 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.024943 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.025825 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.025855 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.025883 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.027144 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.027226 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.027263 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.028124 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.028154 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.028975 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.029004 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.029819 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.029872 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.031120 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.031166 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.031773 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.032391 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.032422 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.033978 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.034021 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.034814 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.034870 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.036067 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.036108 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.036127 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.036965 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.037014 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.037896 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.037919 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.039172 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.039205 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.039226 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.040012 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.040049 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.040840 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.040870 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.042138 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.042165 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.042194 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.043047 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.043116 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.043927 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.043984 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.044800 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.044858 kernel: Failed to create system directory nfs4 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:28.996000 audit[3124]: AVC avc: denied { confidentiality } for pid=3124 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.046051 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.046110 kernel: Failed to create system directory nfs4 Feb 9 18:25:29.153807 kernel: NFS: Registering the id_resolver key type Feb 9 18:25:29.153881 kernel: Key type id_resolver registered Feb 9 18:25:29.153906 kernel: Key type id_legacy registered Feb 9 18:25:28.996000 audit[3124]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffaeb7b010 a1=167c04 a2=aaaab2bde028 a3=aaaad3806010 items=0 ppid=1079 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:28.996000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 18:25:29.154350 kubelet[1441]: E0209 18:25:29.142938 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.162813 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.162850 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.162871 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.164532 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.164578 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.164609 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.164624 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.165994 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.166051 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.166073 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.166772 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.166812 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.168111 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.168153 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.168178 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.168999 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.169021 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.169908 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.169954 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.171148 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.171182 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.171199 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.172083 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.172131 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.173842 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.173895 kernel: Failed to create system directory rpcgss Feb 9 18:25:29.157000 audit[3125]: AVC avc: denied { confidentiality } for pid=3125 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:25:29.157000 audit[3125]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9f503010 a1=3e09c a2=aaaabdfae028 a3=aaaabfe4b010 items=0 ppid=1079 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.157000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 18:25:29.190657 nfsidmap[3133]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 18:25:29.195573 nfsidmap[3136]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 18:25:29.210000 audit[1199]: AVC avc: denied { watch_reads } for pid=1199 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:25:29.210000 audit[1199]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae5ec39b0 a2=10 a3=0 items=0 ppid=1 pid=1199 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.210000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:25:29.210000 audit[1199]: AVC avc: denied { watch_reads } for pid=1199 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:25:29.210000 audit[1199]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae5ec39b0 a2=10 a3=0 items=0 ppid=1 pid=1199 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.210000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:25:29.210000 audit[1199]: AVC avc: denied { watch_reads } for pid=1199 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:25:29.210000 audit[1199]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae5ec39b0 a2=10 a3=0 items=0 ppid=1 pid=1199 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.210000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:25:29.211000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:25:29.211000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:25:29.211000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:25:29.428546 env[1139]: time="2024-02-09T18:25:29.428057816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d3bf8e20-c440-4159-a96b-265378f5bf9d,Namespace:default,Attempt:0,}" Feb 9 18:25:29.569822 systemd-networkd[1052]: cali5ec59c6bf6e: Link UP Feb 9 18:25:29.571117 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:25:29.571155 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 18:25:29.571215 systemd-networkd[1052]: cali5ec59c6bf6e: Gained carrier Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.483 [INFO][3141] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.38-k8s-test--pod--1-eth0 default d3bf8e20-c440-4159-a96b-265378f5bf9d 1145 0 2024-02-09 18:25:14 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.38 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.38-k8s-test--pod--1-" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.483 [INFO][3141] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.38-k8s-test--pod--1-eth0" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.513 [INFO][3155] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" HandleID="k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Workload="10.0.0.38-k8s-test--pod--1-eth0" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.526 [INFO][3155] ipam_plugin.go 268: Auto assigning IP ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" HandleID="k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Workload="10.0.0.38-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ff730), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.38", "pod":"test-pod-1", "timestamp":"2024-02-09 18:25:29.513023304 +0000 UTC"}, Hostname:"10.0.0.38", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.527 [INFO][3155] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.527 [INFO][3155] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.527 [INFO][3155] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.38' Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.529 [INFO][3155] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.536 [INFO][3155] ipam.go 372: Looking up existing affinities for host host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.541 [INFO][3155] ipam.go 489: Trying affinity for 192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.544 [INFO][3155] ipam.go 155: Attempting to load block cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.546 [INFO][3155] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.64/26 host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.546 [INFO][3155] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.64/26 handle="k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.548 [INFO][3155] ipam.go 1682: Creating new handle: k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.557 [INFO][3155] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.64/26 handle="k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.563 [INFO][3155] ipam.go 1216: Successfully claimed IPs: [192.168.116.69/26] block=192.168.116.64/26 handle="k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.563 [INFO][3155] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.69/26] handle="k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" host="10.0.0.38" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.563 [INFO][3155] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.563 [INFO][3155] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.69/26] IPv6=[] ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" HandleID="k8s-pod-network.d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Workload="10.0.0.38-k8s-test--pod--1-eth0" Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.565 [INFO][3141] k8s.go 385: Populated endpoint ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.38-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d3bf8e20-c440-4159-a96b-265378f5bf9d", ResourceVersion:"1145", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 25, 14, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:29.581263 env[1139]: 2024-02-09 18:25:29.565 [INFO][3141] k8s.go 386: Calico CNI using IPs: [192.168.116.69/32] ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.38-k8s-test--pod--1-eth0" Feb 9 18:25:29.581970 env[1139]: 2024-02-09 18:25:29.565 [INFO][3141] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.38-k8s-test--pod--1-eth0" Feb 9 18:25:29.581970 env[1139]: 2024-02-09 18:25:29.571 [INFO][3141] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.38-k8s-test--pod--1-eth0" Feb 9 18:25:29.581970 env[1139]: 2024-02-09 18:25:29.571 [INFO][3141] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.38-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.38-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d3bf8e20-c440-4159-a96b-265378f5bf9d", ResourceVersion:"1145", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 25, 14, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.38", ContainerID:"d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"36:f4:b6:dd:37:b0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:25:29.581970 env[1139]: 2024-02-09 18:25:29.579 [INFO][3141] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.38-k8s-test--pod--1-eth0" Feb 9 18:25:29.589000 audit[3177]: NETFILTER_CFG table=filter:91 family=2 entries=38 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:25:29.589000 audit[3177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19064 a0=3 a1=ffffdded74a0 a2=0 a3=ffff7fda0fa8 items=0 ppid=2194 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.589000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:25:29.594528 env[1139]: time="2024-02-09T18:25:29.594459376Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:25:29.594528 env[1139]: time="2024-02-09T18:25:29.594510695Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:25:29.594528 env[1139]: time="2024-02-09T18:25:29.594521535Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:25:29.594669 env[1139]: time="2024-02-09T18:25:29.594637813Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd pid=3185 runtime=io.containerd.runc.v2 Feb 9 18:25:29.606131 systemd[1]: Started cri-containerd-d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd.scope. Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.648000 audit: BPF prog-id=124 op=LOAD Feb 9 18:25:29.648000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.648000 audit[3195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3185 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433643736373438393238643939396230386162346663303963613363 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3185 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433643736373438393238643939396230386162346663303963613363 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.649000 audit: BPF prog-id=125 op=LOAD Feb 9 18:25:29.649000 audit[3195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3185 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433643736373438393238643939396230386162346663303963613363 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.651000 audit: BPF prog-id=126 op=LOAD Feb 9 18:25:29.651000 audit[3195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3185 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433643736373438393238643939396230386162346663303963613363 Feb 9 18:25:29.652000 audit: BPF prog-id=126 op=UNLOAD Feb 9 18:25:29.653000 audit: BPF prog-id=125 op=UNLOAD Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:29.653000 audit: BPF prog-id=127 op=LOAD Feb 9 18:25:29.653000 audit[3195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3185 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:29.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433643736373438393238643939396230386162346663303963613363 Feb 9 18:25:29.656009 systemd-resolved[1091]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:25:29.673412 env[1139]: time="2024-02-09T18:25:29.673376734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d3bf8e20-c440-4159-a96b-265378f5bf9d,Namespace:default,Attempt:0,} returns sandbox id \"d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd\"" Feb 9 18:25:29.674881 env[1139]: time="2024-02-09T18:25:29.674849707Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 18:25:30.059153 env[1139]: time="2024-02-09T18:25:30.059110088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:30.061775 env[1139]: time="2024-02-09T18:25:30.061723362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:30.063128 env[1139]: time="2024-02-09T18:25:30.063099178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:30.064863 env[1139]: time="2024-02-09T18:25:30.064834587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:25:30.065605 env[1139]: time="2024-02-09T18:25:30.065562254Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 18:25:30.067685 env[1139]: time="2024-02-09T18:25:30.067651018Z" level=info msg="CreateContainer within sandbox \"d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 18:25:30.077250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount745162388.mount: Deactivated successfully. Feb 9 18:25:30.081354 env[1139]: time="2024-02-09T18:25:30.081309858Z" level=info msg="CreateContainer within sandbox \"d3d76748928d999b08ab4fc09ca3ce1657c5647241d39b74d01c3fc4d61957dd\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"1a02ac70bbb2cc16997ad054b1540d02eacffc7a227960fb4be52458183d888d\"" Feb 9 18:25:30.081922 env[1139]: time="2024-02-09T18:25:30.081894768Z" level=info msg="StartContainer for \"1a02ac70bbb2cc16997ad054b1540d02eacffc7a227960fb4be52458183d888d\"" Feb 9 18:25:30.100877 systemd[1]: Started cri-containerd-1a02ac70bbb2cc16997ad054b1540d02eacffc7a227960fb4be52458183d888d.scope. Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.120000 audit: BPF prog-id=128 op=LOAD Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3185 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:30.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161303261633730626262326363313639393761643035346231353430 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3185 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:30.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161303261633730626262326363313639393761643035346231353430 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit: BPF prog-id=129 op=LOAD Feb 9 18:25:30.121000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3185 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:30.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161303261633730626262326363313639393761643035346231353430 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit: BPF prog-id=130 op=LOAD Feb 9 18:25:30.121000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3185 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:30.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161303261633730626262326363313639393761643035346231353430 Feb 9 18:25:30.121000 audit: BPF prog-id=130 op=UNLOAD Feb 9 18:25:30.121000 audit: BPF prog-id=129 op=UNLOAD Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:25:30.121000 audit: BPF prog-id=131 op=LOAD Feb 9 18:25:30.121000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3185 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:25:30.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161303261633730626262326363313639393761643035346231353430 Feb 9 18:25:30.144104 kubelet[1441]: E0209 18:25:30.144020 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:30.146500 env[1139]: time="2024-02-09T18:25:30.146448355Z" level=info msg="StartContainer for \"1a02ac70bbb2cc16997ad054b1540d02eacffc7a227960fb4be52458183d888d\" returns successfully" Feb 9 18:25:30.328544 kubelet[1441]: I0209 18:25:30.328417 1441 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=15.936996107 podCreationTimestamp="2024-02-09 18:25:14 +0000 UTC" firstStartedPulling="2024-02-09 18:25:29.674544593 +0000 UTC m=+51.145002896" lastFinishedPulling="2024-02-09 18:25:30.065917488 +0000 UTC m=+51.536375791" observedRunningTime="2024-02-09 18:25:30.327018266 +0000 UTC m=+51.797476569" watchObservedRunningTime="2024-02-09 18:25:30.328369002 +0000 UTC m=+51.798827265" Feb 9 18:25:31.145122 kubelet[1441]: E0209 18:25:31.145087 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:25:31.169173 systemd-networkd[1052]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 18:25:32.146438 kubelet[1441]: E0209 18:25:32.146405 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"