Feb  9 18:30:25.750836 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1]
Feb  9 18:30:25.750855 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024
Feb  9 18:30:25.750862 kernel: efi: EFI v2.70 by EDK II
Feb  9 18:30:25.750868 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 
Feb  9 18:30:25.750873 kernel: random: crng init done
Feb  9 18:30:25.750878 kernel: ACPI: Early table checksum verification disabled
Feb  9 18:30:25.750894 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS )
Feb  9 18:30:25.750904 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS  BXPC     00000001      01000013)
Feb  9 18:30:25.750910 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750916 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750921 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750928 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750934 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750940 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750947 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750953 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750959 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS  BXPC     00000001 BXPC 00000001)
Feb  9 18:30:25.750965 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600
Feb  9 18:30:25.750971 kernel: NUMA: Failed to initialise from firmware
Feb  9 18:30:25.750977 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff]
Feb  9 18:30:25.750982 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff]
Feb  9 18:30:25.750988 kernel: Zone ranges:
Feb  9 18:30:25.750994 kernel:   DMA      [mem 0x0000000040000000-0x00000000dcffffff]
Feb  9 18:30:25.751000 kernel:   DMA32    empty
Feb  9 18:30:25.751006 kernel:   Normal   empty
Feb  9 18:30:25.751012 kernel: Movable zone start for each node
Feb  9 18:30:25.751017 kernel: Early memory node ranges
Feb  9 18:30:25.751023 kernel:   node   0: [mem 0x0000000040000000-0x00000000d924ffff]
Feb  9 18:30:25.751029 kernel:   node   0: [mem 0x00000000d9250000-0x00000000d951ffff]
Feb  9 18:30:25.751035 kernel:   node   0: [mem 0x00000000d9520000-0x00000000dc7fffff]
Feb  9 18:30:25.751040 kernel:   node   0: [mem 0x00000000dc800000-0x00000000dc88ffff]
Feb  9 18:30:25.751046 kernel:   node   0: [mem 0x00000000dc890000-0x00000000dc89ffff]
Feb  9 18:30:25.751051 kernel:   node   0: [mem 0x00000000dc8a0000-0x00000000dc9bffff]
Feb  9 18:30:25.751057 kernel:   node   0: [mem 0x00000000dc9c0000-0x00000000dcffffff]
Feb  9 18:30:25.751063 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff]
Feb  9 18:30:25.751070 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges
Feb  9 18:30:25.751075 kernel: psci: probing for conduit method from ACPI.
Feb  9 18:30:25.751081 kernel: psci: PSCIv1.1 detected in firmware.
Feb  9 18:30:25.751086 kernel: psci: Using standard PSCI v0.2 function IDs
Feb  9 18:30:25.751092 kernel: psci: Trusted OS migration not required
Feb  9 18:30:25.751100 kernel: psci: SMC Calling Convention v1.1
Feb  9 18:30:25.751106 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003)
Feb  9 18:30:25.751114 kernel: ACPI: SRAT not present
Feb  9 18:30:25.751120 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784
Feb  9 18:30:25.751126 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096
Feb  9 18:30:25.751132 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 
Feb  9 18:30:25.751138 kernel: Detected PIPT I-cache on CPU0
Feb  9 18:30:25.751144 kernel: CPU features: detected: GIC system register CPU interface
Feb  9 18:30:25.751150 kernel: CPU features: detected: Hardware dirty bit management
Feb  9 18:30:25.751156 kernel: CPU features: detected: Spectre-v4
Feb  9 18:30:25.751162 kernel: CPU features: detected: Spectre-BHB
Feb  9 18:30:25.751169 kernel: CPU features: kernel page table isolation forced ON by KASLR
Feb  9 18:30:25.751175 kernel: CPU features: detected: Kernel page table isolation (KPTI)
Feb  9 18:30:25.751181 kernel: CPU features: detected: ARM erratum 1418040
Feb  9 18:30:25.751187 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 633024
Feb  9 18:30:25.751193 kernel: Policy zone: DMA
Feb  9 18:30:25.751200 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4
Feb  9 18:30:25.751207 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Feb  9 18:30:25.751213 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Feb  9 18:30:25.751219 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Feb  9 18:30:25.751225 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Feb  9 18:30:25.751232 kernel: Memory: 2459152K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113136K reserved, 0K cma-reserved)
Feb  9 18:30:25.751239 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
Feb  9 18:30:25.751245 kernel: trace event string verifier disabled
Feb  9 18:30:25.751251 kernel: rcu: Preemptible hierarchical RCU implementation.
Feb  9 18:30:25.751258 kernel: rcu:         RCU event tracing is enabled.
Feb  9 18:30:25.751264 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4.
Feb  9 18:30:25.751270 kernel:         Trampoline variant of Tasks RCU enabled.
Feb  9 18:30:25.751276 kernel:         Tracing variant of Tasks RCU enabled.
Feb  9 18:30:25.751282 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Feb  9 18:30:25.751289 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
Feb  9 18:30:25.751295 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
Feb  9 18:30:25.751301 kernel: GICv3: 256 SPIs implemented
Feb  9 18:30:25.751308 kernel: GICv3: 0 Extended SPIs implemented
Feb  9 18:30:25.751314 kernel: GICv3: Distributor has no Range Selector support
Feb  9 18:30:25.751320 kernel: Root IRQ handler: gic_handle_irq
Feb  9 18:30:25.751326 kernel: GICv3: 16 PPIs implemented
Feb  9 18:30:25.751332 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000
Feb  9 18:30:25.751338 kernel: ACPI: SRAT not present
Feb  9 18:30:25.751344 kernel: ITS [mem 0x08080000-0x0809ffff]
Feb  9 18:30:25.751350 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1)
Feb  9 18:30:25.751357 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1)
Feb  9 18:30:25.751363 kernel: GICv3: using LPI property table @0x00000000400d0000
Feb  9 18:30:25.751369 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000
Feb  9 18:30:25.751375 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Feb  9 18:30:25.751382 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt).
Feb  9 18:30:25.751389 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns
Feb  9 18:30:25.751395 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns
Feb  9 18:30:25.751401 kernel: arm-pv: using stolen time PV
Feb  9 18:30:25.751407 kernel: Console: colour dummy device 80x25
Feb  9 18:30:25.751414 kernel: ACPI: Core revision 20210730
Feb  9 18:30:25.751420 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000)
Feb  9 18:30:25.751426 kernel: pid_max: default: 32768 minimum: 301
Feb  9 18:30:25.751432 kernel: LSM: Security Framework initializing
Feb  9 18:30:25.751438 kernel: SELinux:  Initializing.
Feb  9 18:30:25.751446 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Feb  9 18:30:25.751452 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Feb  9 18:30:25.751458 kernel: rcu: Hierarchical SRCU implementation.
Feb  9 18:30:25.751465 kernel: Platform MSI: ITS@0x8080000 domain created
Feb  9 18:30:25.751471 kernel: PCI/MSI: ITS@0x8080000 domain created
Feb  9 18:30:25.751477 kernel: Remapping and enabling EFI services.
Feb  9 18:30:25.751483 kernel: smp: Bringing up secondary CPUs ...
Feb  9 18:30:25.751489 kernel: Detected PIPT I-cache on CPU1
Feb  9 18:30:25.751495 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000
Feb  9 18:30:25.751503 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000
Feb  9 18:30:25.751516 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Feb  9 18:30:25.751522 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1]
Feb  9 18:30:25.751528 kernel: Detected PIPT I-cache on CPU2
Feb  9 18:30:25.751535 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000
Feb  9 18:30:25.751541 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000
Feb  9 18:30:25.751547 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Feb  9 18:30:25.751554 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1]
Feb  9 18:30:25.751560 kernel: Detected PIPT I-cache on CPU3
Feb  9 18:30:25.751566 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000
Feb  9 18:30:25.751573 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000
Feb  9 18:30:25.751580 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Feb  9 18:30:25.751586 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1]
Feb  9 18:30:25.751592 kernel: smp: Brought up 1 node, 4 CPUs
Feb  9 18:30:25.751603 kernel: SMP: Total of 4 processors activated.
Feb  9 18:30:25.751610 kernel: CPU features: detected: 32-bit EL0 Support
Feb  9 18:30:25.751617 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence
Feb  9 18:30:25.751623 kernel: CPU features: detected: Common not Private translations
Feb  9 18:30:25.751630 kernel: CPU features: detected: CRC32 instructions
Feb  9 18:30:25.751636 kernel: CPU features: detected: RCpc load-acquire (LDAPR)
Feb  9 18:30:25.751643 kernel: CPU features: detected: LSE atomic instructions
Feb  9 18:30:25.751650 kernel: CPU features: detected: Privileged Access Never
Feb  9 18:30:25.751658 kernel: CPU features: detected: RAS Extension Support
Feb  9 18:30:25.751664 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS)
Feb  9 18:30:25.751671 kernel: CPU: All CPU(s) started at EL1
Feb  9 18:30:25.751677 kernel: alternatives: patching kernel code
Feb  9 18:30:25.751685 kernel: devtmpfs: initialized
Feb  9 18:30:25.751691 kernel: KASLR enabled
Feb  9 18:30:25.751698 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Feb  9 18:30:25.751705 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
Feb  9 18:30:25.751711 kernel: pinctrl core: initialized pinctrl subsystem
Feb  9 18:30:25.751718 kernel: SMBIOS 3.0.0 present.
Feb  9 18:30:25.751725 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
Feb  9 18:30:25.751731 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Feb  9 18:30:25.751738 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations
Feb  9 18:30:25.751744 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Feb  9 18:30:25.751752 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Feb  9 18:30:25.751759 kernel: audit: initializing netlink subsys (disabled)
Feb  9 18:30:25.751765 kernel: audit: type=2000 audit(0.030:1): state=initialized audit_enabled=0 res=1
Feb  9 18:30:25.751772 kernel: thermal_sys: Registered thermal governor 'step_wise'
Feb  9 18:30:25.751779 kernel: cpuidle: using governor menu
Feb  9 18:30:25.751785 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
Feb  9 18:30:25.751792 kernel: ASID allocator initialised with 32768 entries
Feb  9 18:30:25.751798 kernel: ACPI: bus type PCI registered
Feb  9 18:30:25.751805 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Feb  9 18:30:25.751812 kernel: Serial: AMBA PL011 UART driver
Feb  9 18:30:25.751819 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Feb  9 18:30:25.751826 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages
Feb  9 18:30:25.751832 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Feb  9 18:30:25.751839 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages
Feb  9 18:30:25.751845 kernel: cryptd: max_cpu_qlen set to 1000
Feb  9 18:30:25.751852 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng)
Feb  9 18:30:25.751859 kernel: ACPI: Added _OSI(Module Device)
Feb  9 18:30:25.751865 kernel: ACPI: Added _OSI(Processor Device)
Feb  9 18:30:25.751872 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Feb  9 18:30:25.751879 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Feb  9 18:30:25.751890 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Feb  9 18:30:25.751897 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Feb  9 18:30:25.751903 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Feb  9 18:30:25.751910 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Feb  9 18:30:25.751916 kernel: ACPI: Interpreter enabled
Feb  9 18:30:25.751922 kernel: ACPI: Using GIC for interrupt routing
Feb  9 18:30:25.751929 kernel: ACPI: MCFG table detected, 1 entries
Feb  9 18:30:25.751937 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA
Feb  9 18:30:25.751943 kernel: printk: console [ttyAMA0] enabled
Feb  9 18:30:25.751950 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Feb  9 18:30:25.752065 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
Feb  9 18:30:25.752128 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR]
Feb  9 18:30:25.752185 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability]
Feb  9 18:30:25.752487 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00
Feb  9 18:30:25.752588 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff]
Feb  9 18:30:25.752599 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io  0x0000-0xffff window]
Feb  9 18:30:25.752606 kernel: PCI host bridge to bus 0000:00
Feb  9 18:30:25.752672 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window]
Feb  9 18:30:25.752725 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0xffff window]
Feb  9 18:30:25.752777 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window]
Feb  9 18:30:25.752830 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Feb  9 18:30:25.752916 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000
Feb  9 18:30:25.752990 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00
Feb  9 18:30:25.753051 kernel: pci 0000:00:01.0: reg 0x10: [io  0x0000-0x001f]
Feb  9 18:30:25.753111 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff]
Feb  9 18:30:25.753171 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref]
Feb  9 18:30:25.753229 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref]
Feb  9 18:30:25.753288 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff]
Feb  9 18:30:25.753349 kernel: pci 0000:00:01.0: BAR 0: assigned [io  0x1000-0x101f]
Feb  9 18:30:25.753400 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window]
Feb  9 18:30:25.753455 kernel: pci_bus 0000:00: resource 5 [io  0x0000-0xffff window]
Feb  9 18:30:25.753507 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window]
Feb  9 18:30:25.753540 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35
Feb  9 18:30:25.753547 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36
Feb  9 18:30:25.753555 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37
Feb  9 18:30:25.753564 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38
Feb  9 18:30:25.753571 kernel: iommu: Default domain type: Translated 
Feb  9 18:30:25.753578 kernel: iommu: DMA domain TLB invalidation policy: strict mode 
Feb  9 18:30:25.753585 kernel: vgaarb: loaded
Feb  9 18:30:25.753592 kernel: pps_core: LinuxPPS API ver. 1 registered
Feb  9 18:30:25.753599 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Feb  9 18:30:25.753606 kernel: PTP clock support registered
Feb  9 18:30:25.753612 kernel: Registered efivars operations
Feb  9 18:30:25.753619 kernel: clocksource: Switched to clocksource arch_sys_counter
Feb  9 18:30:25.753625 kernel: VFS: Disk quotas dquot_6.6.0
Feb  9 18:30:25.753633 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Feb  9 18:30:25.753640 kernel: pnp: PnP ACPI init
Feb  9 18:30:25.753707 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved
Feb  9 18:30:25.753716 kernel: pnp: PnP ACPI: found 1 devices
Feb  9 18:30:25.753723 kernel: NET: Registered PF_INET protocol family
Feb  9 18:30:25.753730 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear)
Feb  9 18:30:25.753736 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
Feb  9 18:30:25.753743 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Feb  9 18:30:25.753752 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
Feb  9 18:30:25.753758 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
Feb  9 18:30:25.753765 kernel: TCP: Hash tables configured (established 32768 bind 32768)
Feb  9 18:30:25.753772 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
Feb  9 18:30:25.753779 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
Feb  9 18:30:25.753785 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Feb  9 18:30:25.753792 kernel: PCI: CLS 0 bytes, default 64
Feb  9 18:30:25.753798 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available
Feb  9 18:30:25.753806 kernel: kvm [1]: HYP mode not available
Feb  9 18:30:25.753813 kernel: Initialise system trusted keyrings
Feb  9 18:30:25.753819 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0
Feb  9 18:30:25.753826 kernel: Key type asymmetric registered
Feb  9 18:30:25.753832 kernel: Asymmetric key parser 'x509' registered
Feb  9 18:30:25.753839 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Feb  9 18:30:25.753846 kernel: io scheduler mq-deadline registered
Feb  9 18:30:25.753852 kernel: io scheduler kyber registered
Feb  9 18:30:25.753859 kernel: io scheduler bfq registered
Feb  9 18:30:25.753866 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0
Feb  9 18:30:25.753874 kernel: ACPI: button: Power Button [PWRB]
Feb  9 18:30:25.753888 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36
Feb  9 18:30:25.753956 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007)
Feb  9 18:30:25.753965 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Feb  9 18:30:25.753971 kernel: thunder_xcv, ver 1.0
Feb  9 18:30:25.753978 kernel: thunder_bgx, ver 1.0
Feb  9 18:30:25.753984 kernel: nicpf, ver 1.0
Feb  9 18:30:25.753991 kernel: nicvf, ver 1.0
Feb  9 18:30:25.754058 kernel: rtc-efi rtc-efi.0: registered as rtc0
Feb  9 18:30:25.754118 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T18:30:25 UTC (1707503425)
Feb  9 18:30:25.754127 kernel: hid: raw HID events driver (C) Jiri Kosina
Feb  9 18:30:25.754134 kernel: NET: Registered PF_INET6 protocol family
Feb  9 18:30:25.754140 kernel: Segment Routing with IPv6
Feb  9 18:30:25.754147 kernel: In-situ OAM (IOAM) with IPv6
Feb  9 18:30:25.754154 kernel: NET: Registered PF_PACKET protocol family
Feb  9 18:30:25.754160 kernel: Key type dns_resolver registered
Feb  9 18:30:25.754167 kernel: registered taskstats version 1
Feb  9 18:30:25.754175 kernel: Loading compiled-in X.509 certificates
Feb  9 18:30:25.754182 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9'
Feb  9 18:30:25.754189 kernel: Key type .fscrypt registered
Feb  9 18:30:25.754195 kernel: Key type fscrypt-provisioning registered
Feb  9 18:30:25.754202 kernel: ima: No TPM chip found, activating TPM-bypass!
Feb  9 18:30:25.754209 kernel: ima: Allocated hash algorithm: sha1
Feb  9 18:30:25.754215 kernel: ima: No architecture policies found
Feb  9 18:30:25.754222 kernel: Freeing unused kernel memory: 34688K
Feb  9 18:30:25.754228 kernel: Run /init as init process
Feb  9 18:30:25.754236 kernel:   with arguments:
Feb  9 18:30:25.754242 kernel:     /init
Feb  9 18:30:25.754249 kernel:   with environment:
Feb  9 18:30:25.754255 kernel:     HOME=/
Feb  9 18:30:25.754261 kernel:     TERM=linux
Feb  9 18:30:25.754268 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Feb  9 18:30:25.754276 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Feb  9 18:30:25.754285 systemd[1]: Detected virtualization kvm.
Feb  9 18:30:25.754294 systemd[1]: Detected architecture arm64.
Feb  9 18:30:25.754300 systemd[1]: Running in initrd.
Feb  9 18:30:25.754307 systemd[1]: No hostname configured, using default hostname.
Feb  9 18:30:25.754314 systemd[1]: Hostname set to <localhost>.
Feb  9 18:30:25.754321 systemd[1]: Initializing machine ID from VM UUID.
Feb  9 18:30:25.754328 systemd[1]: Queued start job for default target initrd.target.
Feb  9 18:30:25.754335 systemd[1]: Started systemd-ask-password-console.path.
Feb  9 18:30:25.754342 systemd[1]: Reached target cryptsetup.target.
Feb  9 18:30:25.754350 systemd[1]: Reached target paths.target.
Feb  9 18:30:25.754357 systemd[1]: Reached target slices.target.
Feb  9 18:30:25.754364 systemd[1]: Reached target swap.target.
Feb  9 18:30:25.754371 systemd[1]: Reached target timers.target.
Feb  9 18:30:25.754379 systemd[1]: Listening on iscsid.socket.
Feb  9 18:30:25.754386 systemd[1]: Listening on iscsiuio.socket.
Feb  9 18:30:25.754393 systemd[1]: Listening on systemd-journald-audit.socket.
Feb  9 18:30:25.754401 systemd[1]: Listening on systemd-journald-dev-log.socket.
Feb  9 18:30:25.754408 systemd[1]: Listening on systemd-journald.socket.
Feb  9 18:30:25.754415 systemd[1]: Listening on systemd-networkd.socket.
Feb  9 18:30:25.754422 systemd[1]: Listening on systemd-udevd-control.socket.
Feb  9 18:30:25.754430 systemd[1]: Listening on systemd-udevd-kernel.socket.
Feb  9 18:30:25.754436 systemd[1]: Reached target sockets.target.
Feb  9 18:30:25.754443 systemd[1]: Starting kmod-static-nodes.service...
Feb  9 18:30:25.754450 systemd[1]: Finished network-cleanup.service.
Feb  9 18:30:25.754457 systemd[1]: Starting systemd-fsck-usr.service...
Feb  9 18:30:25.754466 systemd[1]: Starting systemd-journald.service...
Feb  9 18:30:25.754473 systemd[1]: Starting systemd-modules-load.service...
Feb  9 18:30:25.754480 systemd[1]: Starting systemd-resolved.service...
Feb  9 18:30:25.754487 systemd[1]: Starting systemd-vconsole-setup.service...
Feb  9 18:30:25.754494 systemd[1]: Finished kmod-static-nodes.service.
Feb  9 18:30:25.754501 systemd[1]: Finished systemd-fsck-usr.service.
Feb  9 18:30:25.754537 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Feb  9 18:30:25.754545 systemd[1]: Finished systemd-vconsole-setup.service.
Feb  9 18:30:25.754552 systemd[1]: Starting dracut-cmdline-ask.service...
Feb  9 18:30:25.754561 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Feb  9 18:30:25.754568 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Feb  9 18:30:25.754575 kernel: Bridge firewalling registered
Feb  9 18:30:25.754586 systemd-journald[290]: Journal started
Feb  9 18:30:25.754626 systemd-journald[290]: Runtime Journal (/run/log/journal/c8b70769cea94ff8b0836014adb18e20) is 6.0M, max 48.7M, 42.6M free.
Feb  9 18:30:25.720390 systemd-modules-load[291]: Inserted module 'overlay'
Feb  9 18:30:25.755975 systemd[1]: Started systemd-journald.service.
Feb  9 18:30:25.750000 systemd-modules-load[291]: Inserted module 'br_netfilter'
Feb  9 18:30:25.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.759074 systemd[1]: Finished dracut-cmdline-ask.service.
Feb  9 18:30:25.763763 kernel: audit: type=1130 audit(1707503425.755:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.763781 kernel: SCSI subsystem initialized
Feb  9 18:30:25.763790 kernel: audit: type=1130 audit(1707503425.759:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.761034 systemd[1]: Starting dracut-cmdline.service...
Feb  9 18:30:25.767614 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Feb  9 18:30:25.767643 kernel: device-mapper: uevent: version 1.0.3
Feb  9 18:30:25.767658 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Feb  9 18:30:25.767605 systemd-resolved[292]: Positive Trust Anchors:
Feb  9 18:30:25.767612 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Feb  9 18:30:25.767639 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Feb  9 18:30:25.772596 systemd-resolved[292]: Defaulting to hostname 'linux'.
Feb  9 18:30:25.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.777162 dracut-cmdline[308]: dracut-dracut-053
Feb  9 18:30:25.777162 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4
Feb  9 18:30:25.783175 kernel: audit: type=1130 audit(1707503425.774:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.783194 kernel: audit: type=1130 audit(1707503425.777:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.773419 systemd[1]: Started systemd-resolved.service.
Feb  9 18:30:25.774108 systemd-modules-load[291]: Inserted module 'dm_multipath'
Feb  9 18:30:25.775346 systemd[1]: Finished systemd-modules-load.service.
Feb  9 18:30:25.778400 systemd[1]: Reached target nss-lookup.target.
Feb  9 18:30:25.784269 systemd[1]: Starting systemd-sysctl.service...
Feb  9 18:30:25.790618 systemd[1]: Finished systemd-sysctl.service.
Feb  9 18:30:25.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.793538 kernel: audit: type=1130 audit(1707503425.790:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.832532 kernel: Loading iSCSI transport class v2.0-870.
Feb  9 18:30:25.841538 kernel: iscsi: registered transport (tcp)
Feb  9 18:30:25.854668 kernel: iscsi: registered transport (qla4xxx)
Feb  9 18:30:25.854710 kernel: QLogic iSCSI HBA Driver
Feb  9 18:30:25.888945 systemd[1]: Finished dracut-cmdline.service.
Feb  9 18:30:25.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.890260 systemd[1]: Starting dracut-pre-udev.service...
Feb  9 18:30:25.892545 kernel: audit: type=1130 audit(1707503425.888:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:25.937537 kernel: raid6: neonx8   gen() 13677 MB/s
Feb  9 18:30:25.954530 kernel: raid6: neonx8   xor() 10751 MB/s
Feb  9 18:30:25.971533 kernel: raid6: neonx4   gen() 12953 MB/s
Feb  9 18:30:25.988526 kernel: raid6: neonx4   xor() 11110 MB/s
Feb  9 18:30:26.005537 kernel: raid6: neonx2   gen() 12877 MB/s
Feb  9 18:30:26.022556 kernel: raid6: neonx2   xor() 10216 MB/s
Feb  9 18:30:26.039531 kernel: raid6: neonx1   gen() 10403 MB/s
Feb  9 18:30:26.058924 kernel: raid6: neonx1   xor()  8683 MB/s
Feb  9 18:30:26.073539 kernel: raid6: int64x8  gen()  6253 MB/s
Feb  9 18:30:26.090531 kernel: raid6: int64x8  xor()  3520 MB/s
Feb  9 18:30:26.107603 kernel: raid6: int64x4  gen()  7195 MB/s
Feb  9 18:30:26.124530 kernel: raid6: int64x4  xor()  3834 MB/s
Feb  9 18:30:26.141527 kernel: raid6: int64x2  gen()  6111 MB/s
Feb  9 18:30:26.158544 kernel: raid6: int64x2  xor()  3303 MB/s
Feb  9 18:30:26.175531 kernel: raid6: int64x1  gen()  5017 MB/s
Feb  9 18:30:26.192705 kernel: raid6: int64x1  xor()  2632 MB/s
Feb  9 18:30:26.192730 kernel: raid6: using algorithm neonx8 gen() 13677 MB/s
Feb  9 18:30:26.192739 kernel: raid6: .... xor() 10751 MB/s, rmw enabled
Feb  9 18:30:26.192748 kernel: raid6: using neon recovery algorithm
Feb  9 18:30:26.206548 kernel: xor: measuring software checksum speed
Feb  9 18:30:26.207850 kernel:    8regs           : 17268 MB/sec
Feb  9 18:30:26.207867 kernel:    32regs          : 20749 MB/sec
Feb  9 18:30:26.209550 kernel:    arm64_neon      : 27959 MB/sec
Feb  9 18:30:26.209579 kernel: xor: using function: arm64_neon (27959 MB/sec)
Feb  9 18:30:26.265571 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no
Feb  9 18:30:26.275201 systemd[1]: Finished dracut-pre-udev.service.
Feb  9 18:30:26.278830 kernel: audit: type=1130 audit(1707503426.275:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:26.278849 kernel: audit: type=1334 audit(1707503426.277:9): prog-id=7 op=LOAD
Feb  9 18:30:26.278858 kernel: audit: type=1334 audit(1707503426.278:10): prog-id=8 op=LOAD
Feb  9 18:30:26.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:26.277000 audit: BPF prog-id=7 op=LOAD
Feb  9 18:30:26.278000 audit: BPF prog-id=8 op=LOAD
Feb  9 18:30:26.279146 systemd[1]: Starting systemd-udevd.service...
Feb  9 18:30:26.292854 systemd-udevd[490]: Using default interface naming scheme 'v252'.
Feb  9 18:30:26.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:26.296156 systemd[1]: Started systemd-udevd.service.
Feb  9 18:30:26.298252 systemd[1]: Starting dracut-pre-trigger.service...
Feb  9 18:30:26.310083 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation
Feb  9 18:30:26.340128 systemd[1]: Finished dracut-pre-trigger.service.
Feb  9 18:30:26.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:26.341797 systemd[1]: Starting systemd-udev-trigger.service...
Feb  9 18:30:26.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:26.384161 systemd[1]: Finished systemd-udev-trigger.service.
Feb  9 18:30:26.414785 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB)
Feb  9 18:30:26.422909 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Feb  9 18:30:26.422943 kernel: GPT:9289727 != 19775487
Feb  9 18:30:26.422952 kernel: GPT:Alternate GPT header not at the end of the disk.
Feb  9 18:30:26.422961 kernel: GPT:9289727 != 19775487
Feb  9 18:30:26.423666 kernel: GPT: Use GNU Parted to correct GPT errors.
Feb  9 18:30:26.423694 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Feb  9 18:30:26.441758 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Feb  9 18:30:26.443601 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (548)
Feb  9 18:30:26.446673 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Feb  9 18:30:26.448710 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Feb  9 18:30:26.452658 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Feb  9 18:30:26.471018 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Feb  9 18:30:26.472595 systemd[1]: Starting disk-uuid.service...
Feb  9 18:30:26.486273 disk-uuid[559]: Primary Header is updated.
Feb  9 18:30:26.486273 disk-uuid[559]: Secondary Entries is updated.
Feb  9 18:30:26.486273 disk-uuid[559]: Secondary Header is updated.
Feb  9 18:30:26.490528 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Feb  9 18:30:27.500348 disk-uuid[560]: The operation has completed successfully.
Feb  9 18:30:27.501218 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Feb  9 18:30:27.530800 systemd[1]: disk-uuid.service: Deactivated successfully.
Feb  9 18:30:27.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.530906 systemd[1]: Finished disk-uuid.service.
Feb  9 18:30:27.532413 systemd[1]: Starting verity-setup.service...
Feb  9 18:30:27.550814 kernel: device-mapper: verity: sha256 using implementation "sha256-ce"
Feb  9 18:30:27.582263 systemd[1]: Found device dev-mapper-usr.device.
Feb  9 18:30:27.584390 systemd[1]: Mounting sysusr-usr.mount...
Feb  9 18:30:27.586124 systemd[1]: Finished verity-setup.service.
Feb  9 18:30:27.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.633530 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Feb  9 18:30:27.633853 systemd[1]: Mounted sysusr-usr.mount.
Feb  9 18:30:27.634489 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Feb  9 18:30:27.635188 systemd[1]: Starting ignition-setup.service...
Feb  9 18:30:27.637384 systemd[1]: Starting parse-ip-for-networkd.service...
Feb  9 18:30:27.645613 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm
Feb  9 18:30:27.645644 kernel: BTRFS info (device vda6): using free space tree
Feb  9 18:30:27.645654 kernel: BTRFS info (device vda6): has skinny extents
Feb  9 18:30:27.658947 systemd[1]: mnt-oem.mount: Deactivated successfully.
Feb  9 18:30:27.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.668540 systemd[1]: Finished ignition-setup.service.
Feb  9 18:30:27.670117 systemd[1]: Starting ignition-fetch-offline.service...
Feb  9 18:30:27.728699 systemd[1]: Finished parse-ip-for-networkd.service.
Feb  9 18:30:27.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.729000 audit: BPF prog-id=9 op=LOAD
Feb  9 18:30:27.730690 systemd[1]: Starting systemd-networkd.service...
Feb  9 18:30:27.762187 systemd-networkd[736]: lo: Link UP
Feb  9 18:30:27.762197 systemd-networkd[736]: lo: Gained carrier
Feb  9 18:30:27.763041 systemd-networkd[736]: Enumeration completed
Feb  9 18:30:27.763407 systemd-networkd[736]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 18:30:27.765121 systemd[1]: Started systemd-networkd.service.
Feb  9 18:30:27.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.766352 systemd[1]: Reached target network.target.
Feb  9 18:30:27.768393 systemd[1]: Starting iscsiuio.service...
Feb  9 18:30:27.769379 systemd-networkd[736]: eth0: Link UP
Feb  9 18:30:27.769382 systemd-networkd[736]: eth0: Gained carrier
Feb  9 18:30:27.772979 ignition[659]: Ignition 2.14.0
Feb  9 18:30:27.772987 ignition[659]: Stage: fetch-offline
Feb  9 18:30:27.773023 ignition[659]: no configs at "/usr/lib/ignition/base.d"
Feb  9 18:30:27.773031 ignition[659]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Feb  9 18:30:27.773144 ignition[659]: parsed url from cmdline: ""
Feb  9 18:30:27.778375 systemd[1]: Started iscsiuio.service.
Feb  9 18:30:27.773147 ignition[659]: no config URL provided
Feb  9 18:30:27.773152 ignition[659]: reading system config file "/usr/lib/ignition/user.ign"
Feb  9 18:30:27.773159 ignition[659]: no config at "/usr/lib/ignition/user.ign"
Feb  9 18:30:27.773176 ignition[659]: op(1): [started]  loading QEMU firmware config module
Feb  9 18:30:27.773180 ignition[659]: op(1): executing: "modprobe" "qemu_fw_cfg"
Feb  9 18:30:27.777130 ignition[659]: op(1): [finished] loading QEMU firmware config module
Feb  9 18:30:27.785502 systemd[1]: Starting iscsid.service...
Feb  9 18:30:27.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.789358 iscsid[743]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Feb  9 18:30:27.789358 iscsid[743]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Feb  9 18:30:27.789358 iscsid[743]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Feb  9 18:30:27.789358 iscsid[743]: If using hardware iscsi like qla4xxx this message can be ignored.
Feb  9 18:30:27.789358 iscsid[743]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Feb  9 18:30:27.789358 iscsid[743]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Feb  9 18:30:27.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.796812 systemd[1]: Started iscsid.service.
Feb  9 18:30:27.798439 systemd[1]: Starting dracut-initqueue.service...
Feb  9 18:30:27.803646 systemd-networkd[736]: eth0: DHCPv4 address 10.0.0.69/16, gateway 10.0.0.1 acquired from 10.0.0.1
Feb  9 18:30:27.808723 systemd[1]: Finished dracut-initqueue.service.
Feb  9 18:30:27.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.809734 systemd[1]: Reached target remote-fs-pre.target.
Feb  9 18:30:27.811079 systemd[1]: Reached target remote-cryptsetup.target.
Feb  9 18:30:27.812495 systemd[1]: Reached target remote-fs.target.
Feb  9 18:30:27.814399 systemd[1]: Starting dracut-pre-mount.service...
Feb  9 18:30:27.816418 ignition[659]: parsing config with SHA512: f5a4d377cc43a42795ab0c8e6ec4a31de73cec9def496b9a151656f582149e462d087626b8c732e4d28174e4d10d95ab42f6bf05eb46ed51ace32b0275bad8c2
Feb  9 18:30:27.822886 systemd[1]: Finished dracut-pre-mount.service.
Feb  9 18:30:27.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.837715 unknown[659]: fetched base config from "system"
Feb  9 18:30:27.837726 unknown[659]: fetched user config from "qemu"
Feb  9 18:30:27.838124 ignition[659]: fetch-offline: fetch-offline passed
Feb  9 18:30:27.838183 ignition[659]: Ignition finished successfully
Feb  9 18:30:27.841024 systemd[1]: Finished ignition-fetch-offline.service.
Feb  9 18:30:27.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.842006 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json).
Feb  9 18:30:27.842926 systemd[1]: Starting ignition-kargs.service...
Feb  9 18:30:27.851232 ignition[758]: Ignition 2.14.0
Feb  9 18:30:27.851246 ignition[758]: Stage: kargs
Feb  9 18:30:27.851327 ignition[758]: no configs at "/usr/lib/ignition/base.d"
Feb  9 18:30:27.851337 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Feb  9 18:30:27.853841 systemd[1]: Finished ignition-kargs.service.
Feb  9 18:30:27.852358 ignition[758]: kargs: kargs passed
Feb  9 18:30:27.852395 ignition[758]: Ignition finished successfully
Feb  9 18:30:27.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.855894 systemd[1]: Starting ignition-disks.service...
Feb  9 18:30:27.862463 ignition[764]: Ignition 2.14.0
Feb  9 18:30:27.862477 ignition[764]: Stage: disks
Feb  9 18:30:27.862581 ignition[764]: no configs at "/usr/lib/ignition/base.d"
Feb  9 18:30:27.862593 ignition[764]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Feb  9 18:30:27.863601 ignition[764]: disks: disks passed
Feb  9 18:30:27.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.865049 systemd[1]: Finished ignition-disks.service.
Feb  9 18:30:27.863637 ignition[764]: Ignition finished successfully
Feb  9 18:30:27.866361 systemd[1]: Reached target initrd-root-device.target.
Feb  9 18:30:27.867218 systemd[1]: Reached target local-fs-pre.target.
Feb  9 18:30:27.868184 systemd[1]: Reached target local-fs.target.
Feb  9 18:30:27.869178 systemd[1]: Reached target sysinit.target.
Feb  9 18:30:27.870188 systemd[1]: Reached target basic.target.
Feb  9 18:30:27.871940 systemd[1]: Starting systemd-fsck-root.service...
Feb  9 18:30:27.885260 systemd-fsck[772]: ROOT: clean, 602/553520 files, 56013/553472 blocks
Feb  9 18:30:27.892783 systemd[1]: Finished systemd-fsck-root.service.
Feb  9 18:30:27.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.894565 systemd[1]: Mounting sysroot.mount...
Feb  9 18:30:27.900525 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Feb  9 18:30:27.901040 systemd[1]: Mounted sysroot.mount.
Feb  9 18:30:27.901709 systemd[1]: Reached target initrd-root-fs.target.
Feb  9 18:30:27.903690 systemd[1]: Mounting sysroot-usr.mount...
Feb  9 18:30:27.904610 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Feb  9 18:30:27.904690 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Feb  9 18:30:27.904711 systemd[1]: Reached target ignition-diskful.target.
Feb  9 18:30:27.907131 systemd[1]: Mounted sysroot-usr.mount.
Feb  9 18:30:27.909703 systemd[1]: Starting initrd-setup-root.service...
Feb  9 18:30:27.914334 initrd-setup-root[782]: cut: /sysroot/etc/passwd: No such file or directory
Feb  9 18:30:27.919916 initrd-setup-root[790]: cut: /sysroot/etc/group: No such file or directory
Feb  9 18:30:27.923599 initrd-setup-root[798]: cut: /sysroot/etc/shadow: No such file or directory
Feb  9 18:30:27.927702 initrd-setup-root[806]: cut: /sysroot/etc/gshadow: No such file or directory
Feb  9 18:30:27.957574 systemd[1]: Finished initrd-setup-root.service.
Feb  9 18:30:27.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.959108 systemd[1]: Starting ignition-mount.service...
Feb  9 18:30:27.960218 systemd[1]: Starting sysroot-boot.service...
Feb  9 18:30:27.964111 bash[823]: umount: /sysroot/usr/share/oem: not mounted.
Feb  9 18:30:27.972232 ignition[825]: INFO     : Ignition 2.14.0
Feb  9 18:30:27.972980 ignition[825]: INFO     : Stage: mount
Feb  9 18:30:27.973587 ignition[825]: INFO     : no configs at "/usr/lib/ignition/base.d"
Feb  9 18:30:27.974306 ignition[825]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Feb  9 18:30:27.976214 ignition[825]: INFO     : mount: mount passed
Feb  9 18:30:27.976458 systemd[1]: Finished sysroot-boot.service.
Feb  9 18:30:27.977879 ignition[825]: INFO     : Ignition finished successfully
Feb  9 18:30:27.978290 systemd[1]: Finished ignition-mount.service.
Feb  9 18:30:27.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:27.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:28.595796 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Feb  9 18:30:28.602547 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (833)
Feb  9 18:30:28.604529 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm
Feb  9 18:30:28.604551 kernel: BTRFS info (device vda6): using free space tree
Feb  9 18:30:28.604561 kernel: BTRFS info (device vda6): has skinny extents
Feb  9 18:30:28.610414 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Feb  9 18:30:28.611974 systemd[1]: Starting ignition-files.service...
Feb  9 18:30:28.625385 ignition[853]: INFO     : Ignition 2.14.0
Feb  9 18:30:28.625385 ignition[853]: INFO     : Stage: files
Feb  9 18:30:28.626584 ignition[853]: INFO     : no configs at "/usr/lib/ignition/base.d"
Feb  9 18:30:28.626584 ignition[853]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Feb  9 18:30:28.626584 ignition[853]: DEBUG    : files: compiled without relabeling support, skipping
Feb  9 18:30:28.632295 ignition[853]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Feb  9 18:30:28.632295 ignition[853]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Feb  9 18:30:28.634957 ignition[853]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Feb  9 18:30:28.634957 ignition[853]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Feb  9 18:30:28.637320 ignition[853]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Feb  9 18:30:28.637320 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz"
Feb  9 18:30:28.637320 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1
Feb  9 18:30:28.634986 unknown[853]: wrote ssh authorized keys file for user: core
Feb  9 18:30:28.902320 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET result: OK
Feb  9 18:30:29.085084 systemd-networkd[736]: eth0: Gained IPv6LL
Feb  9 18:30:29.140527 ignition[853]: DEBUG    : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a
Feb  9 18:30:29.142540 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz"
Feb  9 18:30:29.142540 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz"
Feb  9 18:30:29.142540 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1
Feb  9 18:30:29.323701 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET result: OK
Feb  9 18:30:29.444360 ignition[853]: DEBUG    : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251
Feb  9 18:30:29.444360 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz"
Feb  9 18:30:29.447906 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/opt/bin/kubeadm"
Feb  9 18:30:29.447906 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1
Feb  9 18:30:29.504224 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET result: OK
Feb  9 18:30:29.774397 ignition[853]: DEBUG    : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3
Feb  9 18:30:29.776657 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm"
Feb  9 18:30:29.776657 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubelet"
Feb  9 18:30:29.776657 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1
Feb  9 18:30:29.797621 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET result: OK
Feb  9 18:30:30.383238 ignition[853]: DEBUG    : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6
Feb  9 18:30:30.385421 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet"
Feb  9 18:30:30.386699 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/home/core/install.sh"
Feb  9 18:30:30.388049 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh"
Feb  9 18:30:30.389250 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/etc/docker/daemon.json"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(a): [started]  processing unit "prepare-cni-plugins.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(a): op(b): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(a): [finished] processing unit "prepare-cni-plugins.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(c): [started]  processing unit "prepare-critools.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(c): op(d): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(c): [finished] processing unit "prepare-critools.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(e): [started]  processing unit "coreos-metadata.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(e): op(f): [started]  writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(e): [finished] processing unit "coreos-metadata.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(10): [started]  setting preset to enabled for "prepare-critools.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(10): [finished] setting preset to enabled for "prepare-critools.service"
Feb  9 18:30:30.390688 ignition[853]: INFO     : files: op(11): [started]  setting preset to disabled for "coreos-metadata.service"
Feb  9 18:30:30.413594 ignition[853]: INFO     : files: op(11): op(12): [started]  removing enablement symlink(s) for "coreos-metadata.service"
Feb  9 18:30:30.439162 ignition[853]: INFO     : files: op(11): op(12): [finished] removing enablement symlink(s) for "coreos-metadata.service"
Feb  9 18:30:30.440314 ignition[853]: INFO     : files: op(11): [finished] setting preset to disabled for "coreos-metadata.service"
Feb  9 18:30:30.440314 ignition[853]: INFO     : files: op(13): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Feb  9 18:30:30.440314 ignition[853]: INFO     : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Feb  9 18:30:30.440314 ignition[853]: INFO     : files: createResultFile: createFiles: op(14): [started]  writing file "/sysroot/etc/.ignition-result.json"
Feb  9 18:30:30.440314 ignition[853]: INFO     : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json"
Feb  9 18:30:30.440314 ignition[853]: INFO     : files: files passed
Feb  9 18:30:30.440314 ignition[853]: INFO     : Ignition finished successfully
Feb  9 18:30:30.451018 kernel: kauditd_printk_skb: 21 callbacks suppressed
Feb  9 18:30:30.451040 kernel: audit: type=1130 audit(1707503430.441:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.440578 systemd[1]: Finished ignition-files.service.
Feb  9 18:30:30.443106 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Feb  9 18:30:30.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.446148 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Feb  9 18:30:30.460449 kernel: audit: type=1130 audit(1707503430.452:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.460469 kernel: audit: type=1130 audit(1707503430.455:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.460478 kernel: audit: type=1131 audit(1707503430.455:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.460604 initrd-setup-root-after-ignition[877]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory
Feb  9 18:30:30.446782 systemd[1]: Starting ignition-quench.service...
Feb  9 18:30:30.463257 initrd-setup-root-after-ignition[880]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Feb  9 18:30:30.451905 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Feb  9 18:30:30.452822 systemd[1]: ignition-quench.service: Deactivated successfully.
Feb  9 18:30:30.452903 systemd[1]: Finished ignition-quench.service.
Feb  9 18:30:30.455943 systemd[1]: Reached target ignition-complete.target.
Feb  9 18:30:30.461878 systemd[1]: Starting initrd-parse-etc.service...
Feb  9 18:30:30.473881 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Feb  9 18:30:30.473972 systemd[1]: Finished initrd-parse-etc.service.
Feb  9 18:30:30.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.475366 systemd[1]: Reached target initrd-fs.target.
Feb  9 18:30:30.480192 kernel: audit: type=1130 audit(1707503430.474:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.480212 kernel: audit: type=1131 audit(1707503430.474:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.479765 systemd[1]: Reached target initrd.target.
Feb  9 18:30:30.480879 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Feb  9 18:30:30.481634 systemd[1]: Starting dracut-pre-pivot.service...
Feb  9 18:30:30.491661 systemd[1]: Finished dracut-pre-pivot.service.
Feb  9 18:30:30.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.493143 systemd[1]: Starting initrd-cleanup.service...
Feb  9 18:30:30.495755 kernel: audit: type=1130 audit(1707503430.491:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.502093 systemd[1]: Stopped target nss-lookup.target.
Feb  9 18:30:30.502927 systemd[1]: Stopped target remote-cryptsetup.target.
Feb  9 18:30:30.504137 systemd[1]: Stopped target timers.target.
Feb  9 18:30:30.505277 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Feb  9 18:30:30.508545 kernel: audit: type=1131 audit(1707503430.505:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.505392 systemd[1]: Stopped dracut-pre-pivot.service.
Feb  9 18:30:30.506467 systemd[1]: Stopped target initrd.target.
Feb  9 18:30:30.509318 systemd[1]: Stopped target basic.target.
Feb  9 18:30:30.510413 systemd[1]: Stopped target ignition-complete.target.
Feb  9 18:30:30.511506 systemd[1]: Stopped target ignition-diskful.target.
Feb  9 18:30:30.512652 systemd[1]: Stopped target initrd-root-device.target.
Feb  9 18:30:30.513756 systemd[1]: Stopped target remote-fs.target.
Feb  9 18:30:30.514885 systemd[1]: Stopped target remote-fs-pre.target.
Feb  9 18:30:30.515964 systemd[1]: Stopped target sysinit.target.
Feb  9 18:30:30.516957 systemd[1]: Stopped target local-fs.target.
Feb  9 18:30:30.518082 systemd[1]: Stopped target local-fs-pre.target.
Feb  9 18:30:30.519061 systemd[1]: Stopped target swap.target.
Feb  9 18:30:30.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.520144 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Feb  9 18:30:30.524544 kernel: audit: type=1131 audit(1707503430.521:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.520259 systemd[1]: Stopped dracut-pre-mount.service.
Feb  9 18:30:30.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.527540 kernel: audit: type=1131 audit(1707503430.525:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.521344 systemd[1]: Stopped target cryptsetup.target.
Feb  9 18:30:30.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.524021 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Feb  9 18:30:30.524121 systemd[1]: Stopped dracut-initqueue.service.
Feb  9 18:30:30.525395 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Feb  9 18:30:30.525489 systemd[1]: Stopped ignition-fetch-offline.service.
Feb  9 18:30:30.528352 systemd[1]: Stopped target paths.target.
Feb  9 18:30:30.529339 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Feb  9 18:30:30.532552 systemd[1]: Stopped systemd-ask-password-console.path.
Feb  9 18:30:30.533832 systemd[1]: Stopped target slices.target.
Feb  9 18:30:30.534930 systemd[1]: Stopped target sockets.target.
Feb  9 18:30:30.536005 systemd[1]: iscsid.socket: Deactivated successfully.
Feb  9 18:30:30.536069 systemd[1]: Closed iscsid.socket.
Feb  9 18:30:30.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.536981 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Feb  9 18:30:30.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.537078 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Feb  9 18:30:30.538259 systemd[1]: ignition-files.service: Deactivated successfully.
Feb  9 18:30:30.538344 systemd[1]: Stopped ignition-files.service.
Feb  9 18:30:30.540113 systemd[1]: Stopping ignition-mount.service...
Feb  9 18:30:30.541693 systemd[1]: Stopping iscsiuio.service...
Feb  9 18:30:30.542756 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Feb  9 18:30:30.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.542887 systemd[1]: Stopped kmod-static-nodes.service.
Feb  9 18:30:30.544802 systemd[1]: Stopping sysroot-boot.service...
Feb  9 18:30:30.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.545629 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Feb  9 18:30:30.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.548421 ignition[893]: INFO     : Ignition 2.14.0
Feb  9 18:30:30.548421 ignition[893]: INFO     : Stage: umount
Feb  9 18:30:30.548421 ignition[893]: INFO     : no configs at "/usr/lib/ignition/base.d"
Feb  9 18:30:30.548421 ignition[893]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Feb  9 18:30:30.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.545753 systemd[1]: Stopped systemd-udev-trigger.service.
Feb  9 18:30:30.552749 ignition[893]: INFO     : umount: umount passed
Feb  9 18:30:30.552749 ignition[893]: INFO     : Ignition finished successfully
Feb  9 18:30:30.546763 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Feb  9 18:30:30.546853 systemd[1]: Stopped dracut-pre-trigger.service.
Feb  9 18:30:30.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.549323 systemd[1]: iscsiuio.service: Deactivated successfully.
Feb  9 18:30:30.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.549421 systemd[1]: Stopped iscsiuio.service.
Feb  9 18:30:30.550566 systemd[1]: Stopped target network.target.
Feb  9 18:30:30.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.551474 systemd[1]: iscsiuio.socket: Deactivated successfully.
Feb  9 18:30:30.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.551567 systemd[1]: Closed iscsiuio.socket.
Feb  9 18:30:30.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.553393 systemd[1]: Stopping systemd-networkd.service...
Feb  9 18:30:30.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.554526 systemd[1]: Stopping systemd-resolved.service...
Feb  9 18:30:30.555740 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Feb  9 18:30:30.555814 systemd[1]: Finished initrd-cleanup.service.
Feb  9 18:30:30.557014 systemd[1]: ignition-mount.service: Deactivated successfully.
Feb  9 18:30:30.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.557089 systemd[1]: Stopped ignition-mount.service.
Feb  9 18:30:30.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.558022 systemd-networkd[736]: eth0: DHCPv6 lease lost
Feb  9 18:30:30.574000 audit: BPF prog-id=9 op=UNLOAD
Feb  9 18:30:30.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.559521 systemd[1]: ignition-disks.service: Deactivated successfully.
Feb  9 18:30:30.559571 systemd[1]: Stopped ignition-disks.service.
Feb  9 18:30:30.560554 systemd[1]: ignition-kargs.service: Deactivated successfully.
Feb  9 18:30:30.560589 systemd[1]: Stopped ignition-kargs.service.
Feb  9 18:30:30.561681 systemd[1]: ignition-setup.service: Deactivated successfully.
Feb  9 18:30:30.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.561716 systemd[1]: Stopped ignition-setup.service.
Feb  9 18:30:30.563199 systemd[1]: systemd-networkd.service: Deactivated successfully.
Feb  9 18:30:30.563281 systemd[1]: Stopped systemd-networkd.service.
Feb  9 18:30:30.565133 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Feb  9 18:30:30.565429 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Feb  9 18:30:30.565452 systemd[1]: Closed systemd-networkd.socket.
Feb  9 18:30:30.567428 systemd[1]: Stopping network-cleanup.service...
Feb  9 18:30:30.568661 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Feb  9 18:30:30.568718 systemd[1]: Stopped parse-ip-for-networkd.service.
Feb  9 18:30:30.572444 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Feb  9 18:30:30.572488 systemd[1]: Stopped systemd-sysctl.service.
Feb  9 18:30:30.574205 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Feb  9 18:30:30.574244 systemd[1]: Stopped systemd-modules-load.service.
Feb  9 18:30:30.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.576117 systemd[1]: Stopping systemd-udevd.service...
Feb  9 18:30:30.594000 audit: BPF prog-id=6 op=UNLOAD
Feb  9 18:30:30.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.580163 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Feb  9 18:30:30.580676 systemd[1]: systemd-resolved.service: Deactivated successfully.
Feb  9 18:30:30.580767 systemd[1]: Stopped systemd-resolved.service.
Feb  9 18:30:30.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.592175 systemd[1]: systemd-udevd.service: Deactivated successfully.
Feb  9 18:30:30.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.592309 systemd[1]: Stopped systemd-udevd.service.
Feb  9 18:30:30.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.593619 systemd[1]: network-cleanup.service: Deactivated successfully.
Feb  9 18:30:30.593702 systemd[1]: Stopped network-cleanup.service.
Feb  9 18:30:30.595745 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Feb  9 18:30:30.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.595778 systemd[1]: Closed systemd-udevd-control.socket.
Feb  9 18:30:30.597526 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Feb  9 18:30:30.597562 systemd[1]: Closed systemd-udevd-kernel.socket.
Feb  9 18:30:30.599115 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Feb  9 18:30:30.599161 systemd[1]: Stopped dracut-pre-udev.service.
Feb  9 18:30:30.600382 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Feb  9 18:30:30.600421 systemd[1]: Stopped dracut-cmdline.service.
Feb  9 18:30:30.602083 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Feb  9 18:30:30.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.602121 systemd[1]: Stopped dracut-cmdline-ask.service.
Feb  9 18:30:30.605118 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Feb  9 18:30:30.606169 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Feb  9 18:30:30.606218 systemd[1]: Stopped systemd-vconsole-setup.service.
Feb  9 18:30:30.612646 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Feb  9 18:30:30.612729 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Feb  9 18:30:30.655593 systemd[1]: sysroot-boot.service: Deactivated successfully.
Feb  9 18:30:30.655689 systemd[1]: Stopped sysroot-boot.service.
Feb  9 18:30:30.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.657147 systemd[1]: Reached target initrd-switch-root.target.
Feb  9 18:30:30.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.657925 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Feb  9 18:30:30.657977 systemd[1]: Stopped initrd-setup-root.service.
Feb  9 18:30:30.659786 systemd[1]: Starting initrd-switch-root.service...
Feb  9 18:30:30.666293 systemd[1]: Switching root.
Feb  9 18:30:30.688679 iscsid[743]: iscsid shutting down.
Feb  9 18:30:30.689169 systemd-journald[290]: Journal stopped
Feb  9 18:30:32.752976 systemd-journald[290]: Received SIGTERM from PID 1 (systemd).
Feb  9 18:30:32.753036 kernel: SELinux:  Class mctp_socket not defined in policy.
Feb  9 18:30:32.753052 kernel: SELinux:  Class anon_inode not defined in policy.
Feb  9 18:30:32.753062 kernel: SELinux: the above unknown classes and permissions will be allowed
Feb  9 18:30:32.753072 kernel: SELinux:  policy capability network_peer_controls=1
Feb  9 18:30:32.753081 kernel: SELinux:  policy capability open_perms=1
Feb  9 18:30:32.753091 kernel: SELinux:  policy capability extended_socket_class=1
Feb  9 18:30:32.753100 kernel: SELinux:  policy capability always_check_network=0
Feb  9 18:30:32.753110 kernel: SELinux:  policy capability cgroup_seclabel=1
Feb  9 18:30:32.753119 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Feb  9 18:30:32.753128 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Feb  9 18:30:32.753139 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Feb  9 18:30:32.753149 systemd[1]: Successfully loaded SELinux policy in 31.661ms.
Feb  9 18:30:32.753168 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.689ms.
Feb  9 18:30:32.753182 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Feb  9 18:30:32.753194 systemd[1]: Detected virtualization kvm.
Feb  9 18:30:32.753204 systemd[1]: Detected architecture arm64.
Feb  9 18:30:32.753215 systemd[1]: Detected first boot.
Feb  9 18:30:32.753226 systemd[1]: Initializing machine ID from VM UUID.
Feb  9 18:30:32.753237 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Feb  9 18:30:32.753249 systemd[1]: Populated /etc with preset unit settings.
Feb  9 18:30:32.753259 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 18:30:32.753271 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 18:30:32.753284 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 18:30:32.753295 systemd[1]: iscsid.service: Deactivated successfully.
Feb  9 18:30:32.753309 systemd[1]: Stopped iscsid.service.
Feb  9 18:30:32.753323 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Feb  9 18:30:32.753333 systemd[1]: Stopped initrd-switch-root.service.
Feb  9 18:30:32.753343 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Feb  9 18:30:32.753354 systemd[1]: Created slice system-addon\x2dconfig.slice.
Feb  9 18:30:32.753365 systemd[1]: Created slice system-addon\x2drun.slice.
Feb  9 18:30:32.753376 systemd[1]: Created slice system-getty.slice.
Feb  9 18:30:32.753386 systemd[1]: Created slice system-modprobe.slice.
Feb  9 18:30:32.753397 systemd[1]: Created slice system-serial\x2dgetty.slice.
Feb  9 18:30:32.753407 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Feb  9 18:30:32.753417 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Feb  9 18:30:32.753428 systemd[1]: Created slice user.slice.
Feb  9 18:30:32.753438 systemd[1]: Started systemd-ask-password-console.path.
Feb  9 18:30:32.753448 systemd[1]: Started systemd-ask-password-wall.path.
Feb  9 18:30:32.753458 systemd[1]: Set up automount boot.automount.
Feb  9 18:30:32.753470 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Feb  9 18:30:32.753481 systemd[1]: Stopped target initrd-switch-root.target.
Feb  9 18:30:32.753491 systemd[1]: Stopped target initrd-fs.target.
Feb  9 18:30:32.753502 systemd[1]: Stopped target initrd-root-fs.target.
Feb  9 18:30:32.753523 systemd[1]: Reached target integritysetup.target.
Feb  9 18:30:32.755376 systemd[1]: Reached target remote-cryptsetup.target.
Feb  9 18:30:32.755397 systemd[1]: Reached target remote-fs.target.
Feb  9 18:30:32.755412 systemd[1]: Reached target slices.target.
Feb  9 18:30:32.755423 systemd[1]: Reached target swap.target.
Feb  9 18:30:32.755434 systemd[1]: Reached target torcx.target.
Feb  9 18:30:32.755444 systemd[1]: Reached target veritysetup.target.
Feb  9 18:30:32.755455 systemd[1]: Listening on systemd-coredump.socket.
Feb  9 18:30:32.755465 systemd[1]: Listening on systemd-initctl.socket.
Feb  9 18:30:32.755476 systemd[1]: Listening on systemd-networkd.socket.
Feb  9 18:30:32.755486 systemd[1]: Listening on systemd-udevd-control.socket.
Feb  9 18:30:32.755497 systemd[1]: Listening on systemd-udevd-kernel.socket.
Feb  9 18:30:32.755517 systemd[1]: Listening on systemd-userdbd.socket.
Feb  9 18:30:32.755542 systemd[1]: Mounting dev-hugepages.mount...
Feb  9 18:30:32.755553 systemd[1]: Mounting dev-mqueue.mount...
Feb  9 18:30:32.755563 systemd[1]: Mounting media.mount...
Feb  9 18:30:32.755573 systemd[1]: Mounting sys-kernel-debug.mount...
Feb  9 18:30:32.755584 systemd[1]: Mounting sys-kernel-tracing.mount...
Feb  9 18:30:32.755595 systemd[1]: Mounting tmp.mount...
Feb  9 18:30:32.755605 systemd[1]: Starting flatcar-tmpfiles.service...
Feb  9 18:30:32.755616 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Feb  9 18:30:32.755626 systemd[1]: Starting kmod-static-nodes.service...
Feb  9 18:30:32.755638 systemd[1]: Starting modprobe@configfs.service...
Feb  9 18:30:32.755649 systemd[1]: Starting modprobe@dm_mod.service...
Feb  9 18:30:32.755662 systemd[1]: Starting modprobe@drm.service...
Feb  9 18:30:32.755672 systemd[1]: Starting modprobe@efi_pstore.service...
Feb  9 18:30:32.755682 systemd[1]: Starting modprobe@fuse.service...
Feb  9 18:30:32.755692 systemd[1]: Starting modprobe@loop.service...
Feb  9 18:30:32.755704 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Feb  9 18:30:32.755714 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Feb  9 18:30:32.755725 systemd[1]: Stopped systemd-fsck-root.service.
Feb  9 18:30:32.755736 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Feb  9 18:30:32.755746 systemd[1]: Stopped systemd-fsck-usr.service.
Feb  9 18:30:32.755757 kernel: fuse: init (API version 7.34)
Feb  9 18:30:32.755767 systemd[1]: Stopped systemd-journald.service.
Feb  9 18:30:32.755778 kernel: loop: module loaded
Feb  9 18:30:32.755789 systemd[1]: Starting systemd-journald.service...
Feb  9 18:30:32.755801 systemd[1]: Starting systemd-modules-load.service...
Feb  9 18:30:32.755812 systemd[1]: Starting systemd-network-generator.service...
Feb  9 18:30:32.755822 systemd[1]: Starting systemd-remount-fs.service...
Feb  9 18:30:32.755832 systemd[1]: Starting systemd-udev-trigger.service...
Feb  9 18:30:32.755844 systemd[1]: verity-setup.service: Deactivated successfully.
Feb  9 18:30:32.755854 systemd[1]: Stopped verity-setup.service.
Feb  9 18:30:32.755873 systemd[1]: Mounted dev-hugepages.mount.
Feb  9 18:30:32.755885 systemd[1]: Mounted dev-mqueue.mount.
Feb  9 18:30:32.755897 systemd[1]: Mounted media.mount.
Feb  9 18:30:32.755907 systemd[1]: Mounted sys-kernel-debug.mount.
Feb  9 18:30:32.755916 systemd[1]: Mounted sys-kernel-tracing.mount.
Feb  9 18:30:32.755926 systemd[1]: Mounted tmp.mount.
Feb  9 18:30:32.755936 systemd[1]: Finished kmod-static-nodes.service.
Feb  9 18:30:32.755947 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Feb  9 18:30:32.755957 systemd[1]: Finished modprobe@configfs.service.
Feb  9 18:30:32.755970 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Feb  9 18:30:32.755980 systemd[1]: Finished modprobe@dm_mod.service.
Feb  9 18:30:32.755991 systemd[1]: modprobe@drm.service: Deactivated successfully.
Feb  9 18:30:32.756001 systemd[1]: Finished modprobe@drm.service.
Feb  9 18:30:32.756015 systemd-journald[992]: Journal started
Feb  9 18:30:32.756063 systemd-journald[992]: Runtime Journal (/run/log/journal/c8b70769cea94ff8b0836014adb18e20) is 6.0M, max 48.7M, 42.6M free.
Feb  9 18:30:30.748000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Feb  9 18:30:30.910000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Feb  9 18:30:30.910000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Feb  9 18:30:30.910000 audit: BPF prog-id=10 op=LOAD
Feb  9 18:30:30.910000 audit: BPF prog-id=10 op=UNLOAD
Feb  9 18:30:30.910000 audit: BPF prog-id=11 op=LOAD
Feb  9 18:30:30.910000 audit: BPF prog-id=11 op=UNLOAD
Feb  9 18:30:30.948000 audit[926]: AVC avc:  denied  { associate } for  pid=926 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Feb  9 18:30:30.948000 audit[926]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58d4 a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=909 pid=926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:30.948000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 18:30:30.949000 audit[926]: AVC avc:  denied  { associate } for  pid=926 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Feb  9 18:30:30.949000 audit[926]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c59b9 a2=1ed a3=0 items=2 ppid=909 pid=926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:30.949000 audit: CWD cwd="/"
Feb  9 18:30:30.949000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:30.949000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:30.949000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 18:30:32.628000 audit: BPF prog-id=12 op=LOAD
Feb  9 18:30:32.628000 audit: BPF prog-id=3 op=UNLOAD
Feb  9 18:30:32.628000 audit: BPF prog-id=13 op=LOAD
Feb  9 18:30:32.628000 audit: BPF prog-id=14 op=LOAD
Feb  9 18:30:32.628000 audit: BPF prog-id=4 op=UNLOAD
Feb  9 18:30:32.628000 audit: BPF prog-id=5 op=UNLOAD
Feb  9 18:30:32.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.638000 audit: BPF prog-id=12 op=UNLOAD
Feb  9 18:30:32.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.723000 audit: BPF prog-id=15 op=LOAD
Feb  9 18:30:32.723000 audit: BPF prog-id=16 op=LOAD
Feb  9 18:30:32.723000 audit: BPF prog-id=17 op=LOAD
Feb  9 18:30:32.723000 audit: BPF prog-id=13 op=UNLOAD
Feb  9 18:30:32.723000 audit: BPF prog-id=14 op=UNLOAD
Feb  9 18:30:32.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.751000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Feb  9 18:30:32.751000 audit[992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffd6913a70 a2=4000 a3=1 items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:32.751000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Feb  9 18:30:32.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.626722 systemd[1]: Queued start job for default target multi-user.target.
Feb  9 18:30:30.948013 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 18:30:32.626734 systemd[1]: Unnecessary job was removed for dev-vda6.device.
Feb  9 18:30:30.948248 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Feb  9 18:30:32.629610 systemd[1]: systemd-journald.service: Deactivated successfully.
Feb  9 18:30:30.948267 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Feb  9 18:30:30.948296 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Feb  9 18:30:30.948306 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="skipped missing lower profile" missing profile=oem
Feb  9 18:30:30.948332 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Feb  9 18:30:32.757884 systemd[1]: Started systemd-journald.service.
Feb  9 18:30:30.948343 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Feb  9 18:30:30.948557 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Feb  9 18:30:30.948591 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Feb  9 18:30:32.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:30.948604 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Feb  9 18:30:30.948963 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Feb  9 18:30:30.948997 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Feb  9 18:30:30.949014 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2
Feb  9 18:30:30.949028 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Feb  9 18:30:30.949043 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2
Feb  9 18:30:32.758480 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Feb  9 18:30:30.949055 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Feb  9 18:30:32.758631 systemd[1]: Finished modprobe@efi_pstore.service.
Feb  9 18:30:32.373563 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:32Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 18:30:32.373821 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:32Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 18:30:32.373927 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:32Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 18:30:32.374083 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:32Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 18:30:32.374130 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:32Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Feb  9 18:30:32.374189 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2024-02-09T18:30:32Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Feb  9 18:30:32.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.759806 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Feb  9 18:30:32.759963 systemd[1]: Finished modprobe@fuse.service.
Feb  9 18:30:32.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.761030 systemd[1]: modprobe@loop.service: Deactivated successfully.
Feb  9 18:30:32.761182 systemd[1]: Finished modprobe@loop.service.
Feb  9 18:30:32.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.762274 systemd[1]: Finished systemd-modules-load.service.
Feb  9 18:30:32.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.763407 systemd[1]: Finished systemd-network-generator.service.
Feb  9 18:30:32.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.764667 systemd[1]: Finished systemd-remount-fs.service.
Feb  9 18:30:32.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.765756 systemd[1]: Finished flatcar-tmpfiles.service.
Feb  9 18:30:32.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.767104 systemd[1]: Reached target network-pre.target.
Feb  9 18:30:32.768968 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Feb  9 18:30:32.770853 systemd[1]: Mounting sys-kernel-config.mount...
Feb  9 18:30:32.771544 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Feb  9 18:30:32.773177 systemd[1]: Starting systemd-hwdb-update.service...
Feb  9 18:30:32.774936 systemd[1]: Starting systemd-journal-flush.service...
Feb  9 18:30:32.775818 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Feb  9 18:30:32.776767 systemd[1]: Starting systemd-random-seed.service...
Feb  9 18:30:32.777967 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Feb  9 18:30:32.778997 systemd[1]: Starting systemd-sysctl.service...
Feb  9 18:30:32.780792 systemd-journald[992]: Time spent on flushing to /var/log/journal/c8b70769cea94ff8b0836014adb18e20 is 13.074ms for 993 entries.
Feb  9 18:30:32.780792 systemd-journald[992]: System Journal (/var/log/journal/c8b70769cea94ff8b0836014adb18e20) is 8.0M, max 195.6M, 187.6M free.
Feb  9 18:30:32.806528 systemd-journald[992]: Received client request to flush runtime journal.
Feb  9 18:30:32.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.781843 systemd[1]: Starting systemd-sysusers.service...
Feb  9 18:30:32.785283 systemd[1]: Finished systemd-udev-trigger.service.
Feb  9 18:30:32.807685 udevadm[1027]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in.
Feb  9 18:30:32.786562 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Feb  9 18:30:32.787705 systemd[1]: Mounted sys-kernel-config.mount.
Feb  9 18:30:32.789645 systemd[1]: Starting systemd-udev-settle.service...
Feb  9 18:30:32.790639 systemd[1]: Finished systemd-random-seed.service.
Feb  9 18:30:32.791678 systemd[1]: Reached target first-boot-complete.target.
Feb  9 18:30:32.805129 systemd[1]: Finished systemd-sysctl.service.
Feb  9 18:30:32.807333 systemd[1]: Finished systemd-journal-flush.service.
Feb  9 18:30:32.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:32.810802 systemd[1]: Finished systemd-sysusers.service.
Feb  9 18:30:32.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.160577 systemd[1]: Finished systemd-hwdb-update.service.
Feb  9 18:30:33.162556 systemd[1]: Starting systemd-udevd.service...
Feb  9 18:30:33.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.161000 audit: BPF prog-id=18 op=LOAD
Feb  9 18:30:33.161000 audit: BPF prog-id=19 op=LOAD
Feb  9 18:30:33.161000 audit: BPF prog-id=7 op=UNLOAD
Feb  9 18:30:33.161000 audit: BPF prog-id=8 op=UNLOAD
Feb  9 18:30:33.186876 systemd-udevd[1030]: Using default interface naming scheme 'v252'.
Feb  9 18:30:33.199055 systemd[1]: Started systemd-udevd.service.
Feb  9 18:30:33.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.200000 audit: BPF prog-id=20 op=LOAD
Feb  9 18:30:33.201274 systemd[1]: Starting systemd-networkd.service...
Feb  9 18:30:33.208000 audit: BPF prog-id=21 op=LOAD
Feb  9 18:30:33.209000 audit: BPF prog-id=22 op=LOAD
Feb  9 18:30:33.209000 audit: BPF prog-id=23 op=LOAD
Feb  9 18:30:33.210312 systemd[1]: Starting systemd-userdbd.service...
Feb  9 18:30:33.222671 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped.
Feb  9 18:30:33.243986 systemd[1]: Started systemd-userdbd.service.
Feb  9 18:30:33.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.280761 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Feb  9 18:30:33.296013 systemd-networkd[1038]: lo: Link UP
Feb  9 18:30:33.296023 systemd-networkd[1038]: lo: Gained carrier
Feb  9 18:30:33.296376 systemd-networkd[1038]: Enumeration completed
Feb  9 18:30:33.296479 systemd[1]: Started systemd-networkd.service.
Feb  9 18:30:33.296483 systemd-networkd[1038]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 18:30:33.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.299394 systemd-networkd[1038]: eth0: Link UP
Feb  9 18:30:33.299404 systemd-networkd[1038]: eth0: Gained carrier
Feb  9 18:30:33.301868 systemd[1]: Finished systemd-udev-settle.service.
Feb  9 18:30:33.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.303678 systemd[1]: Starting lvm2-activation-early.service...
Feb  9 18:30:33.319413 lvm[1063]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Feb  9 18:30:33.327649 systemd-networkd[1038]: eth0: DHCPv4 address 10.0.0.69/16, gateway 10.0.0.1 acquired from 10.0.0.1
Feb  9 18:30:33.349413 systemd[1]: Finished lvm2-activation-early.service.
Feb  9 18:30:33.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.350265 systemd[1]: Reached target cryptsetup.target.
Feb  9 18:30:33.351974 systemd[1]: Starting lvm2-activation.service...
Feb  9 18:30:33.355627 lvm[1064]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Feb  9 18:30:33.385354 systemd[1]: Finished lvm2-activation.service.
Feb  9 18:30:33.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.386130 systemd[1]: Reached target local-fs-pre.target.
Feb  9 18:30:33.386745 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Feb  9 18:30:33.386776 systemd[1]: Reached target local-fs.target.
Feb  9 18:30:33.387310 systemd[1]: Reached target machines.target.
Feb  9 18:30:33.389138 systemd[1]: Starting ldconfig.service...
Feb  9 18:30:33.390208 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Feb  9 18:30:33.390262 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 18:30:33.391851 systemd[1]: Starting systemd-boot-update.service...
Feb  9 18:30:33.394186 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Feb  9 18:30:33.396324 systemd[1]: Starting systemd-machine-id-commit.service...
Feb  9 18:30:33.397320 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Feb  9 18:30:33.397385 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Feb  9 18:30:33.398384 systemd[1]: Starting systemd-tmpfiles-setup.service...
Feb  9 18:30:33.401915 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1066 (bootctl)
Feb  9 18:30:33.403168 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Feb  9 18:30:33.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.420196 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Feb  9 18:30:33.473805 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Feb  9 18:30:33.482650 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Feb  9 18:30:33.483926 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Feb  9 18:30:33.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.484615 systemd[1]: Finished systemd-machine-id-commit.service.
Feb  9 18:30:33.487830 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Feb  9 18:30:33.511456 systemd-fsck[1075]: fsck.fat 4.2 (2021-01-31)
Feb  9 18:30:33.511456 systemd-fsck[1075]: /dev/vda1: 236 files, 113719/258078 clusters
Feb  9 18:30:33.512604 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Feb  9 18:30:33.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.515651 systemd[1]: Mounting boot.mount...
Feb  9 18:30:33.522167 systemd[1]: Mounted boot.mount.
Feb  9 18:30:33.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.530819 systemd[1]: Finished systemd-boot-update.service.
Feb  9 18:30:33.605932 systemd[1]: Finished systemd-tmpfiles-setup.service.
Feb  9 18:30:33.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.610060 systemd[1]: Starting audit-rules.service...
Feb  9 18:30:33.612063 systemd[1]: Starting clean-ca-certificates.service...
Feb  9 18:30:33.613968 systemd[1]: Starting systemd-journal-catalog-update.service...
Feb  9 18:30:33.621000 audit: BPF prog-id=24 op=LOAD
Feb  9 18:30:33.622597 systemd[1]: Starting systemd-resolved.service...
Feb  9 18:30:33.623000 audit: BPF prog-id=25 op=LOAD
Feb  9 18:30:33.624879 systemd[1]: Starting systemd-timesyncd.service...
Feb  9 18:30:33.626986 systemd[1]: Starting systemd-update-utmp.service...
Feb  9 18:30:33.628283 systemd[1]: Finished clean-ca-certificates.service.
Feb  9 18:30:33.629230 ldconfig[1065]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Feb  9 18:30:33.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.629884 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Feb  9 18:30:33.637431 systemd[1]: Finished ldconfig.service.
Feb  9 18:30:33.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.639000 audit[1092]: SYSTEM_BOOT pid=1092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.641703 systemd[1]: Finished systemd-update-utmp.service.
Feb  9 18:30:33.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.651776 systemd[1]: Finished systemd-journal-catalog-update.service.
Feb  9 18:30:33.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.653971 systemd[1]: Starting systemd-update-done.service...
Feb  9 18:30:33.660287 systemd[1]: Finished systemd-update-done.service.
Feb  9 18:30:33.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:33.671000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Feb  9 18:30:33.671000 audit[1101]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffea5f66a0 a2=420 a3=0 items=0 ppid=1079 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:33.671000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Feb  9 18:30:33.672040 augenrules[1101]: No rules
Feb  9 18:30:33.672742 systemd[1]: Finished audit-rules.service.
Feb  9 18:30:33.680268 systemd[1]: Started systemd-timesyncd.service.
Feb  9 18:30:33.681092 systemd-timesyncd[1091]: Contacted time server 10.0.0.1:123 (10.0.0.1).
Feb  9 18:30:33.681266 systemd-timesyncd[1091]: Initial clock synchronization to Fri 2024-02-09 18:30:33.343330 UTC.
Feb  9 18:30:33.681481 systemd[1]: Reached target time-set.target.
Feb  9 18:30:33.687419 systemd-resolved[1089]: Positive Trust Anchors:
Feb  9 18:30:33.687432 systemd-resolved[1089]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Feb  9 18:30:33.687459 systemd-resolved[1089]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Feb  9 18:30:33.699472 systemd-resolved[1089]: Defaulting to hostname 'linux'.
Feb  9 18:30:33.703007 systemd[1]: Started systemd-resolved.service.
Feb  9 18:30:33.703816 systemd[1]: Reached target network.target.
Feb  9 18:30:33.704529 systemd[1]: Reached target nss-lookup.target.
Feb  9 18:30:33.705257 systemd[1]: Reached target sysinit.target.
Feb  9 18:30:33.706076 systemd[1]: Started motdgen.path.
Feb  9 18:30:33.706761 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Feb  9 18:30:33.707908 systemd[1]: Started logrotate.timer.
Feb  9 18:30:33.708501 systemd[1]: Started mdadm.timer.
Feb  9 18:30:33.709132 systemd[1]: Started systemd-tmpfiles-clean.timer.
Feb  9 18:30:33.709870 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Feb  9 18:30:33.709904 systemd[1]: Reached target paths.target.
Feb  9 18:30:33.710420 systemd[1]: Reached target timers.target.
Feb  9 18:30:33.711469 systemd[1]: Listening on dbus.socket.
Feb  9 18:30:33.713215 systemd[1]: Starting docker.socket...
Feb  9 18:30:33.716142 systemd[1]: Listening on sshd.socket.
Feb  9 18:30:33.716951 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 18:30:33.717351 systemd[1]: Listening on docker.socket.
Feb  9 18:30:33.718157 systemd[1]: Reached target sockets.target.
Feb  9 18:30:33.718881 systemd[1]: Reached target basic.target.
Feb  9 18:30:33.719585 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Feb  9 18:30:33.719617 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Feb  9 18:30:33.720554 systemd[1]: Starting containerd.service...
Feb  9 18:30:33.722259 systemd[1]: Starting dbus.service...
Feb  9 18:30:33.723877 systemd[1]: Starting enable-oem-cloudinit.service...
Feb  9 18:30:33.725633 systemd[1]: Starting extend-filesystems.service...
Feb  9 18:30:33.726331 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Feb  9 18:30:33.727354 systemd[1]: Starting motdgen.service...
Feb  9 18:30:33.731041 systemd[1]: Starting prepare-cni-plugins.service...
Feb  9 18:30:33.732820 systemd[1]: Starting prepare-critools.service...
Feb  9 18:30:33.735032 systemd[1]: Starting ssh-key-proc-cmdline.service...
Feb  9 18:30:33.736799 systemd[1]: Starting sshd-keygen.service...
Feb  9 18:30:33.738184 jq[1111]: false
Feb  9 18:30:33.740419 systemd[1]: Starting systemd-logind.service...
Feb  9 18:30:33.741268 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 18:30:33.741326 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Feb  9 18:30:33.742205 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found vda
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found vda1
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found vda2
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found vda3
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found usr
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found vda4
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found vda6
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found vda7
Feb  9 18:30:33.745341 extend-filesystems[1112]: Found vda9
Feb  9 18:30:33.745341 extend-filesystems[1112]: Checking size of /dev/vda9
Feb  9 18:30:33.742827 systemd[1]: Starting update-engine.service...
Feb  9 18:30:33.744484 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Feb  9 18:30:33.757643 jq[1127]: true
Feb  9 18:30:33.747450 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Feb  9 18:30:33.747628 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Feb  9 18:30:33.749163 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Feb  9 18:30:33.749314 systemd[1]: Finished ssh-key-proc-cmdline.service.
Feb  9 18:30:33.759411 systemd[1]: motdgen.service: Deactivated successfully.
Feb  9 18:30:33.759604 systemd[1]: Finished motdgen.service.
Feb  9 18:30:33.776322 jq[1135]: true
Feb  9 18:30:33.777155 tar[1134]: crictl
Feb  9 18:30:33.785743 tar[1133]: ./
Feb  9 18:30:33.785743 tar[1133]: ./loopback
Feb  9 18:30:33.793710 dbus-daemon[1110]: [system] SELinux support is enabled
Feb  9 18:30:33.793886 systemd[1]: Started dbus.service.
Feb  9 18:30:33.796621 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Feb  9 18:30:33.796656 systemd[1]: Reached target system-config.target.
Feb  9 18:30:33.797585 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Feb  9 18:30:33.797610 systemd[1]: Reached target user-config.target.
Feb  9 18:30:33.807629 extend-filesystems[1112]: Resized partition /dev/vda9
Feb  9 18:30:33.822388 extend-filesystems[1160]: resize2fs 1.46.5 (30-Dec-2021)
Feb  9 18:30:33.842383 update_engine[1126]: I0209 18:30:33.842149  1126 main.cc:92] Flatcar Update Engine starting
Feb  9 18:30:33.844830 systemd[1]: Started update-engine.service.
Feb  9 18:30:33.846811 bash[1165]: Updated "/home/core/.ssh/authorized_keys"
Feb  9 18:30:33.847545 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks
Feb  9 18:30:33.847501 systemd[1]: Started locksmithd.service.
Feb  9 18:30:33.849055 update_engine[1126]: I0209 18:30:33.849001  1126 update_check_scheduler.cc:74] Next update check in 3m34s
Feb  9 18:30:33.849427 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Feb  9 18:30:33.851784 systemd-logind[1122]: Watching system buttons on /dev/input/event0 (Power Button)
Feb  9 18:30:33.852197 systemd-logind[1122]: New seat seat0.
Feb  9 18:30:33.853951 systemd[1]: Started systemd-logind.service.
Feb  9 18:30:33.859629 tar[1133]: ./bandwidth
Feb  9 18:30:33.880450 env[1137]: time="2024-02-09T18:30:33.879271560Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Feb  9 18:30:33.881334 kernel: EXT4-fs (vda9): resized filesystem to 1864699
Feb  9 18:30:33.892429 extend-filesystems[1160]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required
Feb  9 18:30:33.892429 extend-filesystems[1160]: old_desc_blocks = 1, new_desc_blocks = 1
Feb  9 18:30:33.892429 extend-filesystems[1160]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long.
Feb  9 18:30:33.897087 extend-filesystems[1112]: Resized filesystem in /dev/vda9
Feb  9 18:30:33.893107 systemd[1]: extend-filesystems.service: Deactivated successfully.
Feb  9 18:30:33.893254 systemd[1]: Finished extend-filesystems.service.
Feb  9 18:30:33.904871 env[1137]: time="2024-02-09T18:30:33.904823240Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Feb  9 18:30:33.905088 env[1137]: time="2024-02-09T18:30:33.905066920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Feb  9 18:30:33.906373 env[1137]: time="2024-02-09T18:30:33.906339960Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Feb  9 18:30:33.906561 env[1137]: time="2024-02-09T18:30:33.906540560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Feb  9 18:30:33.906941 env[1137]: time="2024-02-09T18:30:33.906912280Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Feb  9 18:30:33.907092 env[1137]: time="2024-02-09T18:30:33.907073360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Feb  9 18:30:33.907163 env[1137]: time="2024-02-09T18:30:33.907146760Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Feb  9 18:30:33.907216 env[1137]: time="2024-02-09T18:30:33.907201920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Feb  9 18:30:33.907365 env[1137]: time="2024-02-09T18:30:33.907347040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Feb  9 18:30:33.907829 env[1137]: time="2024-02-09T18:30:33.907804400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Feb  9 18:30:33.908111 env[1137]: time="2024-02-09T18:30:33.908077880Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Feb  9 18:30:33.908247 env[1137]: time="2024-02-09T18:30:33.908229080Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Feb  9 18:30:33.908359 env[1137]: time="2024-02-09T18:30:33.908341320Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Feb  9 18:30:33.908490 env[1137]: time="2024-02-09T18:30:33.908472560Z" level=info msg="metadata content store policy set" policy=shared
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.913892800Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.913926040Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.913938840Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.913973320Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.913987440Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914001440Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914014120Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914333560Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914351200Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914364120Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914376440Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914390080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914504360Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Feb  9 18:30:33.916533 env[1137]: time="2024-02-09T18:30:33.914608280Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.914819720Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.914843600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.914866160Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.914969800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.914983280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.914995000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915005840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915017920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915029120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915040840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915051240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915063560Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915172160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915188520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.916842 env[1137]: time="2024-02-09T18:30:33.915252800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.917118 env[1137]: time="2024-02-09T18:30:33.915266680Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Feb  9 18:30:33.917118 env[1137]: time="2024-02-09T18:30:33.915279960Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Feb  9 18:30:33.917118 env[1137]: time="2024-02-09T18:30:33.915291120Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Feb  9 18:30:33.917118 env[1137]: time="2024-02-09T18:30:33.915309480Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Feb  9 18:30:33.917118 env[1137]: time="2024-02-09T18:30:33.915340760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.915551080Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.915602640Z" level=info msg="Connect containerd service"
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.915628880Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.916186400Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.916621000Z" level=info msg="Start subscribing containerd event"
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.916676040Z" level=info msg="Start recovering state"
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.916737800Z" level=info msg="Start event monitor"
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.916756920Z" level=info msg="Start snapshots syncer"
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.916765920Z" level=info msg="Start cni network conf syncer for default"
Feb  9 18:30:33.917220 env[1137]: time="2024-02-09T18:30:33.916772960Z" level=info msg="Start streaming server"
Feb  9 18:30:33.918158 env[1137]: time="2024-02-09T18:30:33.917741440Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Feb  9 18:30:33.918348 env[1137]: time="2024-02-09T18:30:33.918328080Z" level=info msg=serving... address=/run/containerd/containerd.sock
Feb  9 18:30:33.918542 env[1137]: time="2024-02-09T18:30:33.918525520Z" level=info msg="containerd successfully booted in 0.040535s"
Feb  9 18:30:33.918586 systemd[1]: Started containerd.service.
Feb  9 18:30:33.934977 locksmithd[1166]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Feb  9 18:30:33.938013 tar[1133]: ./ptp
Feb  9 18:30:33.973030 tar[1133]: ./vlan
Feb  9 18:30:34.006834 tar[1133]: ./host-device
Feb  9 18:30:34.038730 tar[1133]: ./tuning
Feb  9 18:30:34.067499 tar[1133]: ./vrf
Feb  9 18:30:34.097165 tar[1133]: ./sbr
Feb  9 18:30:34.126170 tar[1133]: ./tap
Feb  9 18:30:34.159529 tar[1133]: ./dhcp
Feb  9 18:30:34.198027 systemd[1]: Finished prepare-critools.service.
Feb  9 18:30:34.241288 tar[1133]: ./static
Feb  9 18:30:34.265226 tar[1133]: ./firewall
Feb  9 18:30:34.301448 tar[1133]: ./macvlan
Feb  9 18:30:34.334177 tar[1133]: ./dummy
Feb  9 18:30:34.366570 tar[1133]: ./bridge
Feb  9 18:30:34.401697 tar[1133]: ./ipvlan
Feb  9 18:30:34.429992 tar[1133]: ./portmap
Feb  9 18:30:34.456117 tar[1133]: ./host-local
Feb  9 18:30:34.487729 systemd[1]: Finished prepare-cni-plugins.service.
Feb  9 18:30:34.650813 systemd-networkd[1038]: eth0: Gained IPv6LL
Feb  9 18:30:35.083534 sshd_keygen[1136]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Feb  9 18:30:35.099844 systemd[1]: Finished sshd-keygen.service.
Feb  9 18:30:35.101940 systemd[1]: Starting issuegen.service...
Feb  9 18:30:35.106033 systemd[1]: issuegen.service: Deactivated successfully.
Feb  9 18:30:35.106172 systemd[1]: Finished issuegen.service.
Feb  9 18:30:35.108084 systemd[1]: Starting systemd-user-sessions.service...
Feb  9 18:30:35.113345 systemd[1]: Finished systemd-user-sessions.service.
Feb  9 18:30:35.115459 systemd[1]: Started getty@tty1.service.
Feb  9 18:30:35.117351 systemd[1]: Started serial-getty@ttyAMA0.service.
Feb  9 18:30:35.118322 systemd[1]: Reached target getty.target.
Feb  9 18:30:35.119042 systemd[1]: Reached target multi-user.target.
Feb  9 18:30:35.120991 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Feb  9 18:30:35.127137 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Feb  9 18:30:35.127290 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Feb  9 18:30:35.128319 systemd[1]: Startup finished in 555ms (kernel) + 5.139s (initrd) + 4.413s (userspace) = 10.108s.
Feb  9 18:30:37.774585 systemd[1]: Created slice system-sshd.slice.
Feb  9 18:30:37.775600 systemd[1]: Started sshd@0-10.0.0.69:22-10.0.0.1:59190.service.
Feb  9 18:30:37.816732 sshd[1195]: Accepted publickey for core from 10.0.0.1 port 59190 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8
Feb  9 18:30:37.821036 sshd[1195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:30:37.829363 systemd-logind[1122]: New session 1 of user core.
Feb  9 18:30:37.830173 systemd[1]: Created slice user-500.slice.
Feb  9 18:30:37.831143 systemd[1]: Starting user-runtime-dir@500.service...
Feb  9 18:30:37.838408 systemd[1]: Finished user-runtime-dir@500.service.
Feb  9 18:30:37.839577 systemd[1]: Starting user@500.service...
Feb  9 18:30:37.843834 (systemd)[1198]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:30:37.908060 systemd[1198]: Queued start job for default target default.target.
Feb  9 18:30:37.908792 systemd[1198]: Reached target paths.target.
Feb  9 18:30:37.908897 systemd[1198]: Reached target sockets.target.
Feb  9 18:30:37.908977 systemd[1198]: Reached target timers.target.
Feb  9 18:30:37.909048 systemd[1198]: Reached target basic.target.
Feb  9 18:30:37.909164 systemd[1198]: Reached target default.target.
Feb  9 18:30:37.909225 systemd[1]: Started user@500.service.
Feb  9 18:30:37.909323 systemd[1198]: Startup finished in 58ms.
Feb  9 18:30:37.910137 systemd[1]: Started session-1.scope.
Feb  9 18:30:37.959637 systemd[1]: Started sshd@1-10.0.0.69:22-10.0.0.1:59202.service.
Feb  9 18:30:38.017135 sshd[1207]: Accepted publickey for core from 10.0.0.1 port 59202 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8
Feb  9 18:30:38.018268 sshd[1207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:30:38.022098 systemd-logind[1122]: New session 2 of user core.
Feb  9 18:30:38.022523 systemd[1]: Started session-2.scope.
Feb  9 18:30:38.074658 sshd[1207]: pam_unix(sshd:session): session closed for user core
Feb  9 18:30:38.078254 systemd[1]: Started sshd@2-10.0.0.69:22-10.0.0.1:59210.service.
Feb  9 18:30:38.078741 systemd[1]: sshd@1-10.0.0.69:22-10.0.0.1:59202.service: Deactivated successfully.
Feb  9 18:30:38.079335 systemd[1]: session-2.scope: Deactivated successfully.
Feb  9 18:30:38.079879 systemd-logind[1122]: Session 2 logged out. Waiting for processes to exit.
Feb  9 18:30:38.080828 systemd-logind[1122]: Removed session 2.
Feb  9 18:30:38.112930 sshd[1212]: Accepted publickey for core from 10.0.0.1 port 59210 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8
Feb  9 18:30:38.114214 sshd[1212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:30:38.117118 systemd-logind[1122]: New session 3 of user core.
Feb  9 18:30:38.117850 systemd[1]: Started session-3.scope.
Feb  9 18:30:38.165447 sshd[1212]: pam_unix(sshd:session): session closed for user core
Feb  9 18:30:38.168092 systemd[1]: sshd@2-10.0.0.69:22-10.0.0.1:59210.service: Deactivated successfully.
Feb  9 18:30:38.168622 systemd[1]: session-3.scope: Deactivated successfully.
Feb  9 18:30:38.169055 systemd-logind[1122]: Session 3 logged out. Waiting for processes to exit.
Feb  9 18:30:38.169987 systemd[1]: Started sshd@3-10.0.0.69:22-10.0.0.1:59224.service.
Feb  9 18:30:38.170466 systemd-logind[1122]: Removed session 3.
Feb  9 18:30:38.203820 sshd[1219]: Accepted publickey for core from 10.0.0.1 port 59224 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8
Feb  9 18:30:38.204912 sshd[1219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:30:38.207858 systemd-logind[1122]: New session 4 of user core.
Feb  9 18:30:38.208599 systemd[1]: Started session-4.scope.
Feb  9 18:30:38.259540 sshd[1219]: pam_unix(sshd:session): session closed for user core
Feb  9 18:30:38.263118 systemd[1]: sshd@3-10.0.0.69:22-10.0.0.1:59224.service: Deactivated successfully.
Feb  9 18:30:38.263861 systemd[1]: session-4.scope: Deactivated successfully.
Feb  9 18:30:38.264361 systemd-logind[1122]: Session 4 logged out. Waiting for processes to exit.
Feb  9 18:30:38.265362 systemd[1]: Started sshd@4-10.0.0.69:22-10.0.0.1:59238.service.
Feb  9 18:30:38.266031 systemd-logind[1122]: Removed session 4.
Feb  9 18:30:38.298692 sshd[1225]: Accepted publickey for core from 10.0.0.1 port 59238 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8
Feb  9 18:30:38.299737 sshd[1225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:30:38.302759 systemd-logind[1122]: New session 5 of user core.
Feb  9 18:30:38.303501 systemd[1]: Started session-5.scope.
Feb  9 18:30:38.362474 sudo[1229]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Feb  9 18:30:38.362714 sudo[1229]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 18:30:38.376719 dbus-daemon[1110]: avc:  received setenforce notice (enforcing=1)
Feb  9 18:30:38.378427 sudo[1229]: pam_unix(sudo:session): session closed for user root
Feb  9 18:30:38.380671 sshd[1225]: pam_unix(sshd:session): session closed for user core
Feb  9 18:30:38.383475 systemd[1]: sshd@4-10.0.0.69:22-10.0.0.1:59238.service: Deactivated successfully.
Feb  9 18:30:38.384159 systemd[1]: session-5.scope: Deactivated successfully.
Feb  9 18:30:38.384698 systemd-logind[1122]: Session 5 logged out. Waiting for processes to exit.
Feb  9 18:30:38.385782 systemd[1]: Started sshd@5-10.0.0.69:22-10.0.0.1:59248.service.
Feb  9 18:30:38.386395 systemd-logind[1122]: Removed session 5.
Feb  9 18:30:38.419992 sshd[1233]: Accepted publickey for core from 10.0.0.1 port 59248 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8
Feb  9 18:30:38.421199 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:30:38.424337 systemd-logind[1122]: New session 6 of user core.
Feb  9 18:30:38.425115 systemd[1]: Started session-6.scope.
Feb  9 18:30:38.474960 sudo[1237]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Feb  9 18:30:38.475391 sudo[1237]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 18:30:38.478022 sudo[1237]: pam_unix(sudo:session): session closed for user root
Feb  9 18:30:38.482005 sudo[1236]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Feb  9 18:30:38.482208 sudo[1236]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 18:30:38.489801 systemd[1]: Stopping audit-rules.service...
Feb  9 18:30:38.489000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Feb  9 18:30:38.490840 auditctl[1240]: No rules
Feb  9 18:30:38.491753 systemd[1]: audit-rules.service: Deactivated successfully.
Feb  9 18:30:38.491910 systemd[1]: Stopped audit-rules.service.
Feb  9 18:30:38.492374 kernel: kauditd_printk_skb: 124 callbacks suppressed
Feb  9 18:30:38.492424 kernel: audit: type=1305 audit(1707503438.489:155): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Feb  9 18:30:38.492454 kernel: audit: type=1300 audit(1707503438.489:155): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffff606370 a2=420 a3=0 items=0 ppid=1 pid=1240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:38.489000 audit[1240]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffff606370 a2=420 a3=0 items=0 ppid=1 pid=1240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:38.493168 systemd[1]: Starting audit-rules.service...
Feb  9 18:30:38.494856 kernel: audit: type=1327 audit(1707503438.489:155): proctitle=2F7362696E2F617564697463746C002D44
Feb  9 18:30:38.489000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Feb  9 18:30:38.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.497274 kernel: audit: type=1131 audit(1707503438.489:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.507344 augenrules[1257]: No rules
Feb  9 18:30:38.508110 systemd[1]: Finished audit-rules.service.
Feb  9 18:30:38.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.510283 sudo[1236]: pam_unix(sudo:session): session closed for user root
Feb  9 18:30:38.510519 kernel: audit: type=1130 audit(1707503438.507:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.510000 audit[1236]: USER_END pid=1236 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.510000 audit[1236]: CRED_DISP pid=1236 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.514026 sshd[1233]: pam_unix(sshd:session): session closed for user core
Feb  9 18:30:38.515531 kernel: audit: type=1106 audit(1707503438.510:158): pid=1236 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.515582 kernel: audit: type=1104 audit(1707503438.510:159): pid=1236 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.514000 audit[1233]: USER_END pid=1233 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:38.517041 systemd[1]: Started sshd@6-10.0.0.69:22-10.0.0.1:59260.service.
Feb  9 18:30:38.517566 systemd[1]: sshd@5-10.0.0.69:22-10.0.0.1:59248.service: Deactivated successfully.
Feb  9 18:30:38.518172 systemd[1]: session-6.scope: Deactivated successfully.
Feb  9 18:30:38.514000 audit[1233]: CRED_DISP pid=1233 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:38.519606 systemd-logind[1122]: Session 6 logged out. Waiting for processes to exit.
Feb  9 18:30:38.520403 systemd-logind[1122]: Removed session 6.
Feb  9 18:30:38.521557 kernel: audit: type=1106 audit(1707503438.514:160): pid=1233 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:38.521592 kernel: audit: type=1104 audit(1707503438.514:161): pid=1233 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:38.521608 kernel: audit: type=1130 audit(1707503438.514:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.69:22-10.0.0.1:59260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.69:22-10.0.0.1:59260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.69:22-10.0.0.1:59248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.551000 audit[1262]: USER_ACCT pid=1262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:38.551678 sshd[1262]: Accepted publickey for core from 10.0.0.1 port 59260 ssh2: RSA SHA256:+mjqzBx0jAExxLmXQAd9A2jZt2TW46e6NSOiRFb14I8
Feb  9 18:30:38.551000 audit[1262]: CRED_ACQ pid=1262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:38.551000 audit[1262]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe244e940 a2=3 a3=1 items=0 ppid=1 pid=1262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:38.551000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 18:30:38.552740 sshd[1262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:30:38.555674 systemd-logind[1122]: New session 7 of user core.
Feb  9 18:30:38.556476 systemd[1]: Started session-7.scope.
Feb  9 18:30:38.559000 audit[1262]: USER_START pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:38.560000 audit[1265]: CRED_ACQ pid=1265 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:38.605000 audit[1266]: USER_ACCT pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.607253 sudo[1266]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Feb  9 18:30:38.605000 audit[1266]: CRED_REFR pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:38.607445 sudo[1266]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 18:30:38.607000 audit[1266]: USER_START pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:39.122435 systemd[1]: Reloading.
Feb  9 18:30:39.175996 /usr/lib/systemd/system-generators/torcx-generator[1296]: time="2024-02-09T18:30:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 18:30:39.176026 /usr/lib/systemd/system-generators/torcx-generator[1296]: time="2024-02-09T18:30:39Z" level=info msg="torcx already run"
Feb  9 18:30:39.247430 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 18:30:39.247448 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 18:30:39.261975 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit: BPF prog-id=31 op=LOAD
Feb  9 18:30:39.305000 audit: BPF prog-id=21 op=UNLOAD
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.305000 audit: BPF prog-id=32 op=LOAD
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.306000 audit: BPF prog-id=33 op=LOAD
Feb  9 18:30:39.306000 audit: BPF prog-id=22 op=UNLOAD
Feb  9 18:30:39.306000 audit: BPF prog-id=23 op=UNLOAD
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit: BPF prog-id=34 op=LOAD
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.307000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit: BPF prog-id=35 op=LOAD
Feb  9 18:30:39.308000 audit: BPF prog-id=18 op=UNLOAD
Feb  9 18:30:39.308000 audit: BPF prog-id=19 op=UNLOAD
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.309000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.309000 audit: BPF prog-id=36 op=LOAD
Feb  9 18:30:39.309000 audit: BPF prog-id=29 op=UNLOAD
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.310000 audit: BPF prog-id=37 op=LOAD
Feb  9 18:30:39.310000 audit: BPF prog-id=24 op=UNLOAD
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit: BPF prog-id=38 op=LOAD
Feb  9 18:30:39.311000 audit: BPF prog-id=20 op=UNLOAD
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.311000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit: BPF prog-id=39 op=LOAD
Feb  9 18:30:39.312000 audit: BPF prog-id=15 op=UNLOAD
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit: BPF prog-id=40 op=LOAD
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit: BPF prog-id=41 op=LOAD
Feb  9 18:30:39.312000 audit: BPF prog-id=16 op=UNLOAD
Feb  9 18:30:39.312000 audit: BPF prog-id=17 op=UNLOAD
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.312000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit: BPF prog-id=42 op=LOAD
Feb  9 18:30:39.313000 audit: BPF prog-id=26 op=UNLOAD
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit: BPF prog-id=43 op=LOAD
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit: BPF prog-id=44 op=LOAD
Feb  9 18:30:39.313000 audit: BPF prog-id=27 op=UNLOAD
Feb  9 18:30:39.313000 audit: BPF prog-id=28 op=UNLOAD
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.314000 audit: BPF prog-id=45 op=LOAD
Feb  9 18:30:39.314000 audit: BPF prog-id=25 op=UNLOAD
Feb  9 18:30:39.321769 systemd[1]: Starting systemd-networkd-wait-online.service...
Feb  9 18:30:39.327184 systemd[1]: Finished systemd-networkd-wait-online.service.
Feb  9 18:30:39.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:39.327794 systemd[1]: Reached target network-online.target.
Feb  9 18:30:39.329176 systemd[1]: Started kubelet.service.
Feb  9 18:30:39.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:39.346455 systemd[1]: Starting coreos-metadata.service...
Feb  9 18:30:39.352503 systemd[1]: coreos-metadata.service: Deactivated successfully.
Feb  9 18:30:39.352651 systemd[1]: Finished coreos-metadata.service.
Feb  9 18:30:39.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:39.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:39.470348 kubelet[1334]: E0209 18:30:39.470112    1334 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Feb  9 18:30:39.473713 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 18:30:39.473834 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 18:30:39.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 18:30:39.639217 systemd[1]: Stopped kubelet.service.
Feb  9 18:30:39.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:39.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:39.655172 systemd[1]: Reloading.
Feb  9 18:30:39.705294 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2024-02-09T18:30:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 18:30:39.705321 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2024-02-09T18:30:39Z" level=info msg="torcx already run"
Feb  9 18:30:39.753802 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 18:30:39.753820 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 18:30:39.769733 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit: BPF prog-id=46 op=LOAD
Feb  9 18:30:39.813000 audit: BPF prog-id=31 op=UNLOAD
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit: BPF prog-id=47 op=LOAD
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.813000 audit: BPF prog-id=48 op=LOAD
Feb  9 18:30:39.813000 audit: BPF prog-id=32 op=UNLOAD
Feb  9 18:30:39.813000 audit: BPF prog-id=33 op=UNLOAD
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit: BPF prog-id=49 op=LOAD
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.814000 audit: BPF prog-id=50 op=LOAD
Feb  9 18:30:39.814000 audit: BPF prog-id=34 op=UNLOAD
Feb  9 18:30:39.814000 audit: BPF prog-id=35 op=UNLOAD
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.815000 audit: BPF prog-id=51 op=LOAD
Feb  9 18:30:39.815000 audit: BPF prog-id=36 op=UNLOAD
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit: BPF prog-id=52 op=LOAD
Feb  9 18:30:39.817000 audit: BPF prog-id=37 op=UNLOAD
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.817000 audit: BPF prog-id=53 op=LOAD
Feb  9 18:30:39.817000 audit: BPF prog-id=38 op=UNLOAD
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit: BPF prog-id=54 op=LOAD
Feb  9 18:30:39.818000 audit: BPF prog-id=39 op=UNLOAD
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit: BPF prog-id=55 op=LOAD
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit: BPF prog-id=56 op=LOAD
Feb  9 18:30:39.818000 audit: BPF prog-id=40 op=UNLOAD
Feb  9 18:30:39.818000 audit: BPF prog-id=41 op=UNLOAD
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.818000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit: BPF prog-id=57 op=LOAD
Feb  9 18:30:39.819000 audit: BPF prog-id=42 op=UNLOAD
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit: BPF prog-id=58 op=LOAD
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit: BPF prog-id=59 op=LOAD
Feb  9 18:30:39.819000 audit: BPF prog-id=43 op=UNLOAD
Feb  9 18:30:39.819000 audit: BPF prog-id=44 op=UNLOAD
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:39.819000 audit: BPF prog-id=60 op=LOAD
Feb  9 18:30:39.819000 audit: BPF prog-id=45 op=UNLOAD
Feb  9 18:30:39.831834 systemd[1]: Started kubelet.service.
Feb  9 18:30:39.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:39.871093 kubelet[1442]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 18:30:39.871093 kubelet[1442]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Feb  9 18:30:39.871093 kubelet[1442]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 18:30:39.871426 kubelet[1442]: I0209 18:30:39.871133    1442 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Feb  9 18:30:40.555401 kubelet[1442]: I0209 18:30:40.555364    1442 server.go:467] "Kubelet version" kubeletVersion="v1.28.1"
Feb  9 18:30:40.555559 kubelet[1442]: I0209 18:30:40.555547    1442 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Feb  9 18:30:40.555883 kubelet[1442]: I0209 18:30:40.555869    1442 server.go:895] "Client rotation is on, will bootstrap in background"
Feb  9 18:30:40.559351 kubelet[1442]: I0209 18:30:40.559323    1442 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Feb  9 18:30:40.564531 kubelet[1442]: W0209 18:30:40.564516    1442 machine.go:65] Cannot read vendor id correctly, set empty.
Feb  9 18:30:40.565129 kubelet[1442]: I0209 18:30:40.565116    1442 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Feb  9 18:30:40.565356 kubelet[1442]: I0209 18:30:40.565339    1442 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Feb  9 18:30:40.565506 kubelet[1442]: I0209 18:30:40.565489    1442 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null}
Feb  9 18:30:40.565616 kubelet[1442]: I0209 18:30:40.565523    1442 topology_manager.go:138] "Creating topology manager with none policy"
Feb  9 18:30:40.565616 kubelet[1442]: I0209 18:30:40.565532    1442 container_manager_linux.go:301] "Creating device plugin manager"
Feb  9 18:30:40.565661 kubelet[1442]: I0209 18:30:40.565620    1442 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 18:30:40.565837 kubelet[1442]: I0209 18:30:40.565817    1442 kubelet.go:393] "Attempting to sync node with API server"
Feb  9 18:30:40.565837 kubelet[1442]: I0209 18:30:40.565832    1442 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Feb  9 18:30:40.565888 kubelet[1442]: I0209 18:30:40.565848    1442 kubelet.go:309] "Adding apiserver pod source"
Feb  9 18:30:40.565888 kubelet[1442]: I0209 18:30:40.565861    1442 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Feb  9 18:30:40.566633 kubelet[1442]: E0209 18:30:40.566575    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:40.566891 kubelet[1442]: E0209 18:30:40.566864    1442 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:40.567149 kubelet[1442]: I0209 18:30:40.567133    1442 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Feb  9 18:30:40.567550 kubelet[1442]: W0209 18:30:40.567537    1442 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Feb  9 18:30:40.568453 kubelet[1442]: I0209 18:30:40.568424    1442 server.go:1232] "Started kubelet"
Feb  9 18:30:40.568721 kubelet[1442]: I0209 18:30:40.568700    1442 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Feb  9 18:30:40.569056 kubelet[1442]: I0209 18:30:40.569038    1442 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Feb  9 18:30:40.570258 kubelet[1442]: I0209 18:30:40.570236    1442 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Feb  9 18:30:40.569000 audit[1442]: AVC avc:  denied  { mac_admin } for  pid=1442 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:40.569000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:30:40.569000 audit[1442]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000956c90 a1=4000928798 a2=4000956c60 a3=25 items=0 ppid=1 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.569000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:30:40.570788 kubelet[1442]: E0209 18:30:40.570663    1442 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Feb  9 18:30:40.570788 kubelet[1442]: E0209 18:30:40.570682    1442 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Feb  9 18:30:40.570788 kubelet[1442]: I0209 18:30:40.570712    1442 server.go:462] "Adding debug handlers to kubelet server"
Feb  9 18:30:40.570887 kubelet[1442]: I0209 18:30:40.570873    1442 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Feb  9 18:30:40.569000 audit[1442]: AVC avc:  denied  { mac_admin } for  pid=1442 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:40.569000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:30:40.569000 audit[1442]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400095c860 a1=40009287b0 a2=4000956d20 a3=25 items=0 ppid=1 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.569000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:30:40.571154 kubelet[1442]: I0209 18:30:40.570971    1442 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Feb  9 18:30:40.571269 kubelet[1442]: I0209 18:30:40.571254    1442 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Feb  9 18:30:40.571583 kubelet[1442]: I0209 18:30:40.571503    1442 volume_manager.go:291] "Starting Kubelet Volume Manager"
Feb  9 18:30:40.572479 kubelet[1442]: I0209 18:30:40.572466    1442 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Feb  9 18:30:40.572549 kubelet[1442]: I0209 18:30:40.572535    1442 reconciler_new.go:29] "Reconciler: start to sync state"
Feb  9 18:30:40.574984 kubelet[1442]: E0209 18:30:40.574928    1442 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.69\" not found"
Feb  9 18:30:40.580103 kubelet[1442]: W0209 18:30:40.580061    1442 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 18:30:40.580103 kubelet[1442]: E0209 18:30:40.580110    1442 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 18:30:40.580221 kubelet[1442]: W0209 18:30:40.580204    1442 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.69" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 18:30:40.580221 kubelet[1442]: E0209 18:30:40.580219    1442 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.69" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 18:30:40.580564 kubelet[1442]: E0209 18:30:40.580540    1442 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.69\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms"
Feb  9 18:30:40.580687 kubelet[1442]: E0209 18:30:40.580594    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551bd62850", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 568395856, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 568395856, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.580913 kubelet[1442]: W0209 18:30:40.580888    1442 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 18:30:40.580913 kubelet[1442]: E0209 18:30:40.580913    1442 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 18:30:40.582869 kubelet[1442]: E0209 18:30:40.582796    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551bf8f190", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 570675600, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 570675600, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.595935 kubelet[1442]: I0209 18:30:40.595909    1442 cpu_manager.go:214] "Starting CPU manager" policy="none"
Feb  9 18:30:40.596052 kubelet[1442]: I0209 18:30:40.596041    1442 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Feb  9 18:30:40.596106 kubelet[1442]: I0209 18:30:40.596098    1442 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 18:30:40.596952 kubelet[1442]: E0209 18:30:40.596875    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d729c6a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.69 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595426410, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595426410, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.597707 kubelet[1442]: E0209 18:30:40.597650    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d72cb52", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.69 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595438418, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595438418, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.597922 kubelet[1442]: I0209 18:30:40.597903    1442 policy_none.go:49] "None policy: Start"
Feb  9 18:30:40.598485 kubelet[1442]: I0209 18:30:40.598461    1442 memory_manager.go:169] "Starting memorymanager" policy="None"
Feb  9 18:30:40.598633 kubelet[1442]: I0209 18:30:40.598621    1442 state_mem.go:35] "Initializing new in-memory state store"
Feb  9 18:30:40.598796 kubelet[1442]: E0209 18:30:40.598491    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d72db6b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.69 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595442539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595442539, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.598000 audit[1458]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:40.598000 audit[1458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc7fe2b90 a2=0 a3=1 items=0 ppid=1442 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Feb  9 18:30:40.599000 audit[1460]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:40.599000 audit[1460]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffaca8530 a2=0 a3=1 items=0 ppid=1442 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Feb  9 18:30:40.603550 systemd[1]: Created slice kubepods.slice.
Feb  9 18:30:40.606897 systemd[1]: Created slice kubepods-burstable.slice.
Feb  9 18:30:40.609291 systemd[1]: Created slice kubepods-besteffort.slice.
Feb  9 18:30:40.619154 kubelet[1442]: I0209 18:30:40.619129    1442 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Feb  9 18:30:40.617000 audit[1442]: AVC avc:  denied  { mac_admin } for  pid=1442 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:40.617000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:30:40.617000 audit[1442]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009578c0 a1=4000fee5e8 a2=4000957890 a3=25 items=0 ppid=1 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.617000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:30:40.619413 kubelet[1442]: I0209 18:30:40.619192    1442 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Feb  9 18:30:40.619413 kubelet[1442]: I0209 18:30:40.619366    1442 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Feb  9 18:30:40.619997 kubelet[1442]: E0209 18:30:40.619959    1442 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.69\" not found"
Feb  9 18:30:40.621232 kubelet[1442]: E0209 18:30:40.621160    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551eeb5e92", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 620117650, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 620117650, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.601000 audit[1462]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:40.601000 audit[1462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc6ba5690 a2=0 a3=1 items=0 ppid=1442 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 18:30:40.624000 audit[1467]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:40.624000 audit[1467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc58350d0 a2=0 a3=1 items=0 ppid=1442 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 18:30:40.654000 audit[1472]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:40.654000 audit[1472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdf607af0 a2=0 a3=1 items=0 ppid=1442 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Feb  9 18:30:40.656330 kubelet[1442]: I0209 18:30:40.656296    1442 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Feb  9 18:30:40.655000 audit[1474]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:40.655000 audit[1474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffae22580 a2=0 a3=1 items=0 ppid=1442 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Feb  9 18:30:40.655000 audit[1473]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:40.655000 audit[1473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff87593d0 a2=0 a3=1 items=0 ppid=1442 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Feb  9 18:30:40.657482 kubelet[1442]: I0209 18:30:40.657465    1442 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Feb  9 18:30:40.657540 kubelet[1442]: I0209 18:30:40.657496    1442 status_manager.go:217] "Starting to sync pod status with apiserver"
Feb  9 18:30:40.657540 kubelet[1442]: I0209 18:30:40.657530    1442 kubelet.go:2303] "Starting kubelet main sync loop"
Feb  9 18:30:40.657583 kubelet[1442]: E0209 18:30:40.657578    1442 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Feb  9 18:30:40.658860 kubelet[1442]: W0209 18:30:40.658835    1442 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 18:30:40.657000 audit[1475]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:40.657000 audit[1475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1247f80 a2=0 a3=1 items=0 ppid=1442 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Feb  9 18:30:40.659030 kubelet[1442]: E0209 18:30:40.658867    1442 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 18:30:40.657000 audit[1476]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:40.657000 audit[1476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc390f340 a2=0 a3=1 items=0 ppid=1442 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Feb  9 18:30:40.658000 audit[1477]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:40.658000 audit[1477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd86d3520 a2=0 a3=1 items=0 ppid=1442 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Feb  9 18:30:40.659000 audit[1478]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:40.659000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1fc0840 a2=0 a3=1 items=0 ppid=1442 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Feb  9 18:30:40.659000 audit[1479]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:40.659000 audit[1479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe08e4880 a2=0 a3=1 items=0 ppid=1442 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:40.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Feb  9 18:30:40.676491 kubelet[1442]: I0209 18:30:40.676470    1442 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.69"
Feb  9 18:30:40.680434 kubelet[1442]: E0209 18:30:40.680405    1442 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.69"
Feb  9 18:30:40.681230 kubelet[1442]: E0209 18:30:40.681149    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d729c6a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.69 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595426410, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 676426560, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d729c6a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.682160 kubelet[1442]: E0209 18:30:40.682096    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d72cb52", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.69 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595438418, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 676439392, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d72cb52" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.683204 kubelet[1442]: E0209 18:30:40.683133    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d72db6b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.69 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595442539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 676442610, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d72db6b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.782278 kubelet[1442]: E0209 18:30:40.782230    1442 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.69\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms"
Feb  9 18:30:40.881309 kubelet[1442]: I0209 18:30:40.881219    1442 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.69"
Feb  9 18:30:40.883101 kubelet[1442]: E0209 18:30:40.883057    1442 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.69"
Feb  9 18:30:40.883742 kubelet[1442]: E0209 18:30:40.883669    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d729c6a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.69 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595426410, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 881173852, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d729c6a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.884795 kubelet[1442]: E0209 18:30:40.884733    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d72cb52", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.69 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595438418, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 881185978, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d72cb52" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:40.885911 kubelet[1442]: E0209 18:30:40.885827    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d72db6b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.69 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595442539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 881189196, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d72db6b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:41.184243 kubelet[1442]: E0209 18:30:41.184149    1442 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.69\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms"
Feb  9 18:30:41.284134 kubelet[1442]: I0209 18:30:41.284102    1442 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.69"
Feb  9 18:30:41.285580 kubelet[1442]: E0209 18:30:41.285552    1442 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.69"
Feb  9 18:30:41.285640 kubelet[1442]: E0209 18:30:41.285548    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d729c6a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.69 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595426410, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 41, 284053615, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d729c6a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:41.286588 kubelet[1442]: E0209 18:30:41.286528    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d72cb52", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.69 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595438418, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 41, 284069625, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d72cb52" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:41.287595 kubelet[1442]: E0209 18:30:41.287535    1442 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69.17b245551d72db6b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.69", UID:"10.0.0.69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.69 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.69"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 30, 40, 595442539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 30, 41, 284072850, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.69"}': 'events "10.0.0.69.17b245551d72db6b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 18:30:41.558393 kubelet[1442]: I0209 18:30:41.558304    1442 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials"
Feb  9 18:30:41.567676 kubelet[1442]: E0209 18:30:41.567649    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:41.923757 kubelet[1442]: E0209 18:30:41.923647    1442 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.69" not found
Feb  9 18:30:41.988639 kubelet[1442]: E0209 18:30:41.988607    1442 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.69\" not found" node="10.0.0.69"
Feb  9 18:30:42.086947 kubelet[1442]: I0209 18:30:42.086913    1442 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.69"
Feb  9 18:30:42.096124 kubelet[1442]: I0209 18:30:42.096089    1442 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.69"
Feb  9 18:30:42.099331 kubelet[1442]: I0209 18:30:42.099293    1442 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24"
Feb  9 18:30:42.099793 env[1137]: time="2024-02-09T18:30:42.099717220Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Feb  9 18:30:42.100047 kubelet[1442]: I0209 18:30:42.099952    1442 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24"
Feb  9 18:30:42.348271 sudo[1266]: pam_unix(sudo:session): session closed for user root
Feb  9 18:30:42.347000 audit[1266]: USER_END pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:42.348000 audit[1266]: CRED_DISP pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:42.349706 sshd[1262]: pam_unix(sshd:session): session closed for user core
Feb  9 18:30:42.350000 audit[1262]: USER_END pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:42.350000 audit[1262]: CRED_DISP pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Feb  9 18:30:42.352064 systemd[1]: session-7.scope: Deactivated successfully.
Feb  9 18:30:42.352712 systemd-logind[1122]: Session 7 logged out. Waiting for processes to exit.
Feb  9 18:30:42.352805 systemd[1]: sshd@6-10.0.0.69:22-10.0.0.1:59260.service: Deactivated successfully.
Feb  9 18:30:42.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.69:22-10.0.0.1:59260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:30:42.353773 systemd-logind[1122]: Removed session 7.
Feb  9 18:30:42.567247 kubelet[1442]: I0209 18:30:42.567211    1442 apiserver.go:52] "Watching apiserver"
Feb  9 18:30:42.568570 kubelet[1442]: E0209 18:30:42.568552    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:42.570320 kubelet[1442]: I0209 18:30:42.570300    1442 topology_manager.go:215] "Topology Admit Handler" podUID="39e99ef3-fe59-47ec-b6c2-54c726d3fdec" podNamespace="calico-system" podName="calico-node-n9z7j"
Feb  9 18:30:42.570422 kubelet[1442]: I0209 18:30:42.570410    1442 topology_manager.go:215] "Topology Admit Handler" podUID="4e67516f-d909-458a-b537-604bd569ef1b" podNamespace="kube-system" podName="kube-proxy-krf9w"
Feb  9 18:30:42.570467 kubelet[1442]: I0209 18:30:42.570455    1442 topology_manager.go:215] "Topology Admit Handler" podUID="c5573626-adbf-4afe-9dc3-8de1ed165bc5" podNamespace="calico-system" podName="csi-node-driver-snw99"
Feb  9 18:30:42.570635 kubelet[1442]: E0209 18:30:42.570620    1442 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-snw99" podUID="c5573626-adbf-4afe-9dc3-8de1ed165bc5"
Feb  9 18:30:42.572980 kubelet[1442]: I0209 18:30:42.572962    1442 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Feb  9 18:30:42.576184 systemd[1]: Created slice kubepods-besteffort-pod39e99ef3_fe59_47ec_b6c2_54c726d3fdec.slice.
Feb  9 18:30:42.583149 kubelet[1442]: I0209 18:30:42.583081    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-cni-bin-dir\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583149 kubelet[1442]: I0209 18:30:42.583112    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c5573626-adbf-4afe-9dc3-8de1ed165bc5-socket-dir\") pod \"csi-node-driver-snw99\" (UID: \"c5573626-adbf-4afe-9dc3-8de1ed165bc5\") " pod="calico-system/csi-node-driver-snw99"
Feb  9 18:30:42.583149 kubelet[1442]: I0209 18:30:42.583131    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-xtables-lock\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583149 kubelet[1442]: I0209 18:30:42.583151    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-policysync\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583149 kubelet[1442]: I0209 18:30:42.583171    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-node-certs\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583419 kubelet[1442]: I0209 18:30:42.583232    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-var-lib-calico\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583419 kubelet[1442]: I0209 18:30:42.583277    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4e67516f-d909-458a-b537-604bd569ef1b-lib-modules\") pod \"kube-proxy-krf9w\" (UID: \"4e67516f-d909-458a-b537-604bd569ef1b\") " pod="kube-system/kube-proxy-krf9w"
Feb  9 18:30:42.583419 kubelet[1442]: I0209 18:30:42.583306    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cx4hh\" (UniqueName: \"kubernetes.io/projected/4e67516f-d909-458a-b537-604bd569ef1b-kube-api-access-cx4hh\") pod \"kube-proxy-krf9w\" (UID: \"4e67516f-d909-458a-b537-604bd569ef1b\") " pod="kube-system/kube-proxy-krf9w"
Feb  9 18:30:42.583419 kubelet[1442]: I0209 18:30:42.583326    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c5573626-adbf-4afe-9dc3-8de1ed165bc5-varrun\") pod \"csi-node-driver-snw99\" (UID: \"c5573626-adbf-4afe-9dc3-8de1ed165bc5\") " pod="calico-system/csi-node-driver-snw99"
Feb  9 18:30:42.583419 kubelet[1442]: I0209 18:30:42.583353    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c5573626-adbf-4afe-9dc3-8de1ed165bc5-kubelet-dir\") pod \"csi-node-driver-snw99\" (UID: \"c5573626-adbf-4afe-9dc3-8de1ed165bc5\") " pod="calico-system/csi-node-driver-snw99"
Feb  9 18:30:42.583618 kubelet[1442]: I0209 18:30:42.583384    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-lib-modules\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583618 kubelet[1442]: I0209 18:30:42.583417    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-var-run-calico\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583618 kubelet[1442]: I0209 18:30:42.583441    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-cni-net-dir\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583618 kubelet[1442]: I0209 18:30:42.583463    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-flexvol-driver-host\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583618 kubelet[1442]: I0209 18:30:42.583485    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-65d4t\" (UniqueName: \"kubernetes.io/projected/c5573626-adbf-4afe-9dc3-8de1ed165bc5-kube-api-access-65d4t\") pod \"csi-node-driver-snw99\" (UID: \"c5573626-adbf-4afe-9dc3-8de1ed165bc5\") " pod="calico-system/csi-node-driver-snw99"
Feb  9 18:30:42.583846 kubelet[1442]: I0209 18:30:42.583506    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-cni-log-dir\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583846 kubelet[1442]: I0209 18:30:42.583548    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jjmq7\" (UniqueName: \"kubernetes.io/projected/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-kube-api-access-jjmq7\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583846 kubelet[1442]: I0209 18:30:42.583566    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/39e99ef3-fe59-47ec-b6c2-54c726d3fdec-tigera-ca-bundle\") pod \"calico-node-n9z7j\" (UID: \"39e99ef3-fe59-47ec-b6c2-54c726d3fdec\") " pod="calico-system/calico-node-n9z7j"
Feb  9 18:30:42.583846 kubelet[1442]: I0209 18:30:42.583584    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4e67516f-d909-458a-b537-604bd569ef1b-kube-proxy\") pod \"kube-proxy-krf9w\" (UID: \"4e67516f-d909-458a-b537-604bd569ef1b\") " pod="kube-system/kube-proxy-krf9w"
Feb  9 18:30:42.583846 kubelet[1442]: I0209 18:30:42.583601    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4e67516f-d909-458a-b537-604bd569ef1b-xtables-lock\") pod \"kube-proxy-krf9w\" (UID: \"4e67516f-d909-458a-b537-604bd569ef1b\") " pod="kube-system/kube-proxy-krf9w"
Feb  9 18:30:42.584155 kubelet[1442]: I0209 18:30:42.583625    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c5573626-adbf-4afe-9dc3-8de1ed165bc5-registration-dir\") pod \"csi-node-driver-snw99\" (UID: \"c5573626-adbf-4afe-9dc3-8de1ed165bc5\") " pod="calico-system/csi-node-driver-snw99"
Feb  9 18:30:42.592973 systemd[1]: Created slice kubepods-besteffort-pod4e67516f_d909_458a_b537_604bd569ef1b.slice.
Feb  9 18:30:42.685906 kubelet[1442]: E0209 18:30:42.685829    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.686052 kubelet[1442]: W0209 18:30:42.686034    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.686135 kubelet[1442]: E0209 18:30:42.686122    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.686498 kubelet[1442]: E0209 18:30:42.686484    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.686592 kubelet[1442]: W0209 18:30:42.686577    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.686655 kubelet[1442]: E0209 18:30:42.686645    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.687047 kubelet[1442]: E0209 18:30:42.687031    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.687155 kubelet[1442]: W0209 18:30:42.687141    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.687278 kubelet[1442]: E0209 18:30:42.687255    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.687445 kubelet[1442]: E0209 18:30:42.687434    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.690279 kubelet[1442]: W0209 18:30:42.690258    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.690434 kubelet[1442]: E0209 18:30:42.690409    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.690554 kubelet[1442]: E0209 18:30:42.690542    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.690641 kubelet[1442]: W0209 18:30:42.690629    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.690759 kubelet[1442]: E0209 18:30:42.690741    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.690925 kubelet[1442]: E0209 18:30:42.690912    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.690999 kubelet[1442]: W0209 18:30:42.690987    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.691149 kubelet[1442]: E0209 18:30:42.691131    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.691318 kubelet[1442]: E0209 18:30:42.691305    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.691378 kubelet[1442]: W0209 18:30:42.691367    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.691492 kubelet[1442]: E0209 18:30:42.691476    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.691645 kubelet[1442]: E0209 18:30:42.691633    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.691707 kubelet[1442]: W0209 18:30:42.691697    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.691784 kubelet[1442]: E0209 18:30:42.691774    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.692054 kubelet[1442]: E0209 18:30:42.692040    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.692128 kubelet[1442]: W0209 18:30:42.692116    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.692190 kubelet[1442]: E0209 18:30:42.692173    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.692401 kubelet[1442]: E0209 18:30:42.692387    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.692470 kubelet[1442]: W0209 18:30:42.692458    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.692550 kubelet[1442]: E0209 18:30:42.692540    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.694613 kubelet[1442]: E0209 18:30:42.694583    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.694811 kubelet[1442]: W0209 18:30:42.694730    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.695001 kubelet[1442]: E0209 18:30:42.694987    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.695243 kubelet[1442]: E0209 18:30:42.695227    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.695293 kubelet[1442]: W0209 18:30:42.695242    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.695293 kubelet[1442]: E0209 18:30:42.695263    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.695494 kubelet[1442]: E0209 18:30:42.695480    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.695542 kubelet[1442]: W0209 18:30:42.695494    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.698686 kubelet[1442]: E0209 18:30:42.698656    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.699093 kubelet[1442]: E0209 18:30:42.699080    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.699184 kubelet[1442]: W0209 18:30:42.699171    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.699241 kubelet[1442]: E0209 18:30:42.699230    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.703131 kubelet[1442]: E0209 18:30:42.703115    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.703220 kubelet[1442]: W0209 18:30:42.703207    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.703275 kubelet[1442]: E0209 18:30:42.703266    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.708103 kubelet[1442]: E0209 18:30:42.708088    1442 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 18:30:42.708103 kubelet[1442]: W0209 18:30:42.708101    1442 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 18:30:42.708191 kubelet[1442]: E0209 18:30:42.708117    1442 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 18:30:42.890911 kubelet[1442]: E0209 18:30:42.890880    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:42.892174 env[1137]: time="2024-02-09T18:30:42.891800301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n9z7j,Uid:39e99ef3-fe59-47ec-b6c2-54c726d3fdec,Namespace:calico-system,Attempt:0,}"
Feb  9 18:30:42.897118 kubelet[1442]: E0209 18:30:42.897095    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:42.897491 env[1137]: time="2024-02-09T18:30:42.897447125Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-krf9w,Uid:4e67516f-d909-458a-b537-604bd569ef1b,Namespace:kube-system,Attempt:0,}"
Feb  9 18:30:43.415371 env[1137]: time="2024-02-09T18:30:43.415323942Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:43.416229 env[1137]: time="2024-02-09T18:30:43.416201385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:43.417984 env[1137]: time="2024-02-09T18:30:43.417958719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:43.420193 env[1137]: time="2024-02-09T18:30:43.420166306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:43.421554 env[1137]: time="2024-02-09T18:30:43.421530730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:43.424006 env[1137]: time="2024-02-09T18:30:43.423977878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:43.425656 env[1137]: time="2024-02-09T18:30:43.425618867Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:43.426687 env[1137]: time="2024-02-09T18:30:43.426643617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:43.451976 env[1137]: time="2024-02-09T18:30:43.451921218Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:30:43.451976 env[1137]: time="2024-02-09T18:30:43.451959920Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:30:43.451976 env[1137]: time="2024-02-09T18:30:43.451973308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:30:43.452440 env[1137]: time="2024-02-09T18:30:43.452392165Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609 pid=1521 runtime=io.containerd.runc.v2
Feb  9 18:30:43.453368 env[1137]: time="2024-02-09T18:30:43.453297410Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:30:43.453368 env[1137]: time="2024-02-09T18:30:43.453328254Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:30:43.453368 env[1137]: time="2024-02-09T18:30:43.453337258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:30:43.453524 env[1137]: time="2024-02-09T18:30:43.453475995Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f0dc07de7af5be4e4c2f54d1875e2c5a810d0a09d06f08713abc7a1ca637f39 pid=1524 runtime=io.containerd.runc.v2
Feb  9 18:30:43.477598 systemd[1]: Started cri-containerd-9f0dc07de7af5be4e4c2f54d1875e2c5a810d0a09d06f08713abc7a1ca637f39.scope.
Feb  9 18:30:43.479605 systemd[1]: Started cri-containerd-783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609.scope.
Feb  9 18:30:43.504986 kernel: kauditd_printk_skb: 416 callbacks suppressed
Feb  9 18:30:43.505054 kernel: audit: type=1400 audit(1707503443.503:544): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.508207 kernel: audit: type=1400 audit(1707503443.503:545): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.508272 kernel: audit: type=1400 audit(1707503443.503:546): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509875 kernel: audit: type=1400 audit(1707503443.503:547): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.511608 kernel: audit: type=1400 audit(1707503443.503:548): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.513262 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Feb  9 18:30:43.513302 kernel: audit: type=1400 audit(1707503443.503:549): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.513338 kernel: audit: type=1400 audit(1707503443.503:550): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.513756 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64
Feb  9 18:30:43.513787 kernel: audit: backlog limit exceeded
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.503000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.504000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.504000 audit: BPF prog-id=61 op=LOAD
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=1524 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:43.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966306463303764653761663562653465346332663534643138373565
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=1524 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:43.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966306463303764653761663562653465346332663534643138373565
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.506000 audit: BPF prog-id=62 op=LOAD
Feb  9 18:30:43.506000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=1524 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:43.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966306463303764653761663562653465346332663534643138373565
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.507000 audit: BPF prog-id=63 op=LOAD
Feb  9 18:30:43.507000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=1524 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:43.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966306463303764653761663562653465346332663534643138373565
Feb  9 18:30:43.509000 audit: BPF prog-id=63 op=UNLOAD
Feb  9 18:30:43.509000 audit: BPF prog-id=62 op=UNLOAD
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { perfmon } for  pid=1541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit[1541]: AVC avc:  denied  { bpf } for  pid=1541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.509000 audit: BPF prog-id=64 op=LOAD
Feb  9 18:30:43.509000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=1524 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:43.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966306463303764653761663562653465346332663534643138373565
Feb  9 18:30:43.511000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.511000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.511000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.511000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.511000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.511000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.511000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.511000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.514000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.514000 audit: BPF prog-id=65 op=LOAD
Feb  9 18:30:43.517000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:43.517000 audit: BPF prog-id=68 op=LOAD
Feb  9 18:30:43.517000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1521 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:43.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336261643463323030393434656638306532343164373137326631
Feb  9 18:30:43.532772 env[1137]: time="2024-02-09T18:30:43.532729040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n9z7j,Uid:39e99ef3-fe59-47ec-b6c2-54c726d3fdec,Namespace:calico-system,Attempt:0,} returns sandbox id \"783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609\""
Feb  9 18:30:43.533840 kubelet[1442]: E0209 18:30:43.533820    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:43.535108 env[1137]: time="2024-02-09T18:30:43.535076746Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\""
Feb  9 18:30:43.535788 env[1137]: time="2024-02-09T18:30:43.535755542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-krf9w,Uid:4e67516f-d909-458a-b537-604bd569ef1b,Namespace:kube-system,Attempt:0,} returns sandbox id \"9f0dc07de7af5be4e4c2f54d1875e2c5a810d0a09d06f08713abc7a1ca637f39\""
Feb  9 18:30:43.536726 kubelet[1442]: E0209 18:30:43.536568    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:43.569563 kubelet[1442]: E0209 18:30:43.569520    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:43.693591 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount23468700.mount: Deactivated successfully.
Feb  9 18:30:44.570197 kubelet[1442]: E0209 18:30:44.570160    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:44.658611 kubelet[1442]: E0209 18:30:44.658558    1442 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-snw99" podUID="c5573626-adbf-4afe-9dc3-8de1ed165bc5"
Feb  9 18:30:44.749419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4121739196.mount: Deactivated successfully.
Feb  9 18:30:44.816361 env[1137]: time="2024-02-09T18:30:44.816307998Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:44.817820 env[1137]: time="2024-02-09T18:30:44.817774769Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:44.819128 env[1137]: time="2024-02-09T18:30:44.819101077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:44.820904 env[1137]: time="2024-02-09T18:30:44.820826742Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\""
Feb  9 18:30:44.821383 env[1137]: time="2024-02-09T18:30:44.821264704Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:44.822037 env[1137]: time="2024-02-09T18:30:44.822007603Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\""
Feb  9 18:30:44.823342 env[1137]: time="2024-02-09T18:30:44.823302860Z" level=info msg="CreateContainer within sandbox \"783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Feb  9 18:30:44.833987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount485252026.mount: Deactivated successfully.
Feb  9 18:30:44.838868 env[1137]: time="2024-02-09T18:30:44.838675617Z" level=info msg="CreateContainer within sandbox \"783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca\""
Feb  9 18:30:44.839669 env[1137]: time="2024-02-09T18:30:44.839489361Z" level=info msg="StartContainer for \"9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca\""
Feb  9 18:30:44.865126 systemd[1]: Started cri-containerd-9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca.scope.
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:44.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353830323561386134343364373934646438373836343562616431
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.896000 audit: BPF prog-id=69 op=LOAD
Feb  9 18:30:44.896000 audit[1594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:44.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353830323561386134343364373934646438373836343562616431
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.897000 audit: BPF prog-id=70 op=LOAD
Feb  9 18:30:44.897000 audit[1594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:44.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353830323561386134343364373934646438373836343562616431
Feb  9 18:30:44.898000 audit: BPF prog-id=70 op=UNLOAD
Feb  9 18:30:44.898000 audit: BPF prog-id=69 op=UNLOAD
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { perfmon } for  pid=1594 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit[1594]: AVC avc:  denied  { bpf } for  pid=1594 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:44.898000 audit: BPF prog-id=71 op=LOAD
Feb  9 18:30:44.898000 audit[1594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:44.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353830323561386134343364373934646438373836343562616431
Feb  9 18:30:44.921533 env[1137]: time="2024-02-09T18:30:44.919526713Z" level=info msg="StartContainer for \"9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca\" returns successfully"
Feb  9 18:30:44.925009 systemd[1]: cri-containerd-9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca.scope: Deactivated successfully.
Feb  9 18:30:44.928000 audit: BPF prog-id=71 op=UNLOAD
Feb  9 18:30:44.975288 env[1137]: time="2024-02-09T18:30:44.975232853Z" level=info msg="shim disconnected" id=9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca
Feb  9 18:30:44.975288 env[1137]: time="2024-02-09T18:30:44.975280795Z" level=warning msg="cleaning up after shim disconnected" id=9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca namespace=k8s.io
Feb  9 18:30:44.975566 env[1137]: time="2024-02-09T18:30:44.975328658Z" level=info msg="cleaning up dead shim"
Feb  9 18:30:44.984355 env[1137]: time="2024-02-09T18:30:44.984303054Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:30:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1632 runtime=io.containerd.runc.v2\n"
Feb  9 18:30:45.570661 kubelet[1442]: E0209 18:30:45.570618    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:45.671852 kubelet[1442]: E0209 18:30:45.671820    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:45.750273 systemd[1]: run-containerd-runc-k8s.io-9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca-runc.W2S91w.mount: Deactivated successfully.
Feb  9 18:30:45.750358 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9058025a8a443d794dd878645bad1f0d362cb7a557bf7e6b12b3b38e244799ca-rootfs.mount: Deactivated successfully.
Feb  9 18:30:45.922480 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2014151883.mount: Deactivated successfully.
Feb  9 18:30:46.367365 env[1137]: time="2024-02-09T18:30:46.367240568Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:46.368530 env[1137]: time="2024-02-09T18:30:46.368482520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:46.370200 env[1137]: time="2024-02-09T18:30:46.369590064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:46.373750 env[1137]: time="2024-02-09T18:30:46.373713392Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:46.373962 env[1137]: time="2024-02-09T18:30:46.373940842Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\""
Feb  9 18:30:46.375149 env[1137]: time="2024-02-09T18:30:46.375086420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\""
Feb  9 18:30:46.376054 env[1137]: time="2024-02-09T18:30:46.376002248Z" level=info msg="CreateContainer within sandbox \"9f0dc07de7af5be4e4c2f54d1875e2c5a810d0a09d06f08713abc7a1ca637f39\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Feb  9 18:30:46.387562 env[1137]: time="2024-02-09T18:30:46.387505224Z" level=info msg="CreateContainer within sandbox \"9f0dc07de7af5be4e4c2f54d1875e2c5a810d0a09d06f08713abc7a1ca637f39\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"434ef2cd1c8ea843b353055a04d91fe9590b9016ca15fa605254c29f0be8a82d\""
Feb  9 18:30:46.388055 env[1137]: time="2024-02-09T18:30:46.388031076Z" level=info msg="StartContainer for \"434ef2cd1c8ea843b353055a04d91fe9590b9016ca15fa605254c29f0be8a82d\""
Feb  9 18:30:46.402994 systemd[1]: Started cri-containerd-434ef2cd1c8ea843b353055a04d91fe9590b9016ca15fa605254c29f0be8a82d.scope.
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1524 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346566326364316338656138343362333533303535613034643931
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.427000 audit: BPF prog-id=72 op=LOAD
Feb  9 18:30:46.427000 audit[1657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1524 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346566326364316338656138343362333533303535613034643931
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit: BPF prog-id=73 op=LOAD
Feb  9 18:30:46.428000 audit[1657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1524 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346566326364316338656138343362333533303535613034643931
Feb  9 18:30:46.428000 audit: BPF prog-id=73 op=UNLOAD
Feb  9 18:30:46.428000 audit: BPF prog-id=72 op=UNLOAD
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { perfmon } for  pid=1657 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit[1657]: AVC avc:  denied  { bpf } for  pid=1657 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:46.428000 audit: BPF prog-id=74 op=LOAD
Feb  9 18:30:46.428000 audit[1657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1524 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346566326364316338656138343362333533303535613034643931
Feb  9 18:30:46.443455 env[1137]: time="2024-02-09T18:30:46.443400432Z" level=info msg="StartContainer for \"434ef2cd1c8ea843b353055a04d91fe9590b9016ca15fa605254c29f0be8a82d\" returns successfully"
Feb  9 18:30:46.554000 audit[1710]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.554000 audit[1710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe40a25d0 a2=0 a3=ffffa68e46c0 items=0 ppid=1668 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Feb  9 18:30:46.555000 audit[1709]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.555000 audit[1709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc3a81f0 a2=0 a3=ffffabeba6c0 items=0 ppid=1668 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Feb  9 18:30:46.555000 audit[1711]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.555000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee867310 a2=0 a3=ffffa5f676c0 items=0 ppid=1668 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Feb  9 18:30:46.557000 audit[1713]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.557000 audit[1713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8834080 a2=0 a3=ffffbb60a6c0 items=0 ppid=1668 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Feb  9 18:30:46.558000 audit[1712]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.558000 audit[1712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0a2b430 a2=0 a3=ffff915c76c0 items=0 ppid=1668 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Feb  9 18:30:46.559000 audit[1715]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.559000 audit[1715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdcfa5f90 a2=0 a3=ffffba14b6c0 items=0 ppid=1668 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Feb  9 18:30:46.571240 kubelet[1442]: E0209 18:30:46.571211    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:46.658404 kubelet[1442]: E0209 18:30:46.657962    1442 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-snw99" podUID="c5573626-adbf-4afe-9dc3-8de1ed165bc5"
Feb  9 18:30:46.658000 audit[1716]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.658000 audit[1716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe697c2d0 a2=0 a3=ffffbb3a66c0 items=0 ppid=1668 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Feb  9 18:30:46.661000 audit[1718]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.661000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcd6340f0 a2=0 a3=ffffbe3706c0 items=0 ppid=1668 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Feb  9 18:30:46.664000 audit[1721]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.664000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffc096b00 a2=0 a3=ffff826cc6c0 items=0 ppid=1668 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Feb  9 18:30:46.665000 audit[1722]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.665000 audit[1722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc33990a0 a2=0 a3=ffff9cb286c0 items=0 ppid=1668 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Feb  9 18:30:46.667000 audit[1724]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.667000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc344a400 a2=0 a3=ffffa8e1d6c0 items=0 ppid=1668 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Feb  9 18:30:46.668000 audit[1725]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.668000 audit[1725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc951aef0 a2=0 a3=ffff9bc956c0 items=0 ppid=1668 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Feb  9 18:30:46.670000 audit[1727]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.670000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc32b1b80 a2=0 a3=ffffa302c6c0 items=0 ppid=1668 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Feb  9 18:30:46.675119 kubelet[1442]: E0209 18:30:46.675099    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:46.674000 audit[1730]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.674000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd7fb84e0 a2=0 a3=ffffa637f6c0 items=0 ppid=1668 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Feb  9 18:30:46.675000 audit[1731]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.675000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9b0c0b0 a2=0 a3=ffffbb8f56c0 items=0 ppid=1668 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Feb  9 18:30:46.677000 audit[1733]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.677000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe0af4f70 a2=0 a3=ffffb00a96c0 items=0 ppid=1668 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Feb  9 18:30:46.679000 audit[1734]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.679000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0e6fa70 a2=0 a3=ffffac5bc6c0 items=0 ppid=1668 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Feb  9 18:30:46.681000 audit[1736]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.681000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff03591f0 a2=0 a3=ffffa065e6c0 items=0 ppid=1668 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 18:30:46.686172 kubelet[1442]: I0209 18:30:46.686145    1442 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-krf9w" podStartSLOduration=2.849023397 podCreationTimestamp="2024-02-09 18:30:41 +0000 UTC" firstStartedPulling="2024-02-09 18:30:43.537209811 +0000 UTC m=+3.702011856" lastFinishedPulling="2024-02-09 18:30:46.374282592 +0000 UTC m=+6.539084636" observedRunningTime="2024-02-09 18:30:46.685364451 +0000 UTC m=+6.850166495" watchObservedRunningTime="2024-02-09 18:30:46.686096177 +0000 UTC m=+6.850898222"
Feb  9 18:30:46.686000 audit[1739]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.686000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcc582540 a2=0 a3=ffff93d506c0 items=0 ppid=1668 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 18:30:46.691000 audit[1742]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.691000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee564650 a2=0 a3=ffff8fe846c0 items=0 ppid=1668 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Feb  9 18:30:46.692000 audit[1743]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.692000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffea14e430 a2=0 a3=ffff982926c0 items=0 ppid=1668 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Feb  9 18:30:46.694000 audit[1745]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.694000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe0f5b1a0 a2=0 a3=ffff883666c0 items=0 ppid=1668 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 18:30:46.718000 audit[1750]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.718000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc68d05b0 a2=0 a3=ffffbd5c86c0 items=0 ppid=1668 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 18:30:46.719000 audit[1751]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.719000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3ab1580 a2=0 a3=ffffb3b016c0 items=0 ppid=1668 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.719000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Feb  9 18:30:46.721000 audit[1753]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:30:46.721000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd2065110 a2=0 a3=ffff93b7d6c0 items=0 ppid=1668 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Feb  9 18:30:46.735000 audit[1759]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:46.735000 audit[1759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd1a246d0 a2=0 a3=ffff808e56c0 items=0 ppid=1668 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:46.746000 audit[1759]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:46.746000 audit[1759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd1a246d0 a2=0 a3=ffff808e56c0 items=0 ppid=1668 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:46.747000 audit[1765]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.747000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcfa86940 a2=0 a3=ffffa96886c0 items=0 ppid=1668 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Feb  9 18:30:46.750000 audit[1767]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.750000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcc5a6680 a2=0 a3=ffff8865f6c0 items=0 ppid=1668 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Feb  9 18:30:46.753000 audit[1770]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.753000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc019c330 a2=0 a3=ffffa32d06c0 items=0 ppid=1668 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Feb  9 18:30:46.754000 audit[1771]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.754000 audit[1771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4059380 a2=0 a3=ffffbbc046c0 items=0 ppid=1668 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Feb  9 18:30:46.756000 audit[1773]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.756000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee675350 a2=0 a3=ffff9afa66c0 items=0 ppid=1668 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Feb  9 18:30:46.758000 audit[1774]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.758000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec8cfbd0 a2=0 a3=ffffa3ea36c0 items=0 ppid=1668 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Feb  9 18:30:46.761000 audit[1776]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.761000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc27a8020 a2=0 a3=ffffaec0d6c0 items=0 ppid=1668 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Feb  9 18:30:46.764000 audit[1779]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.764000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffda58bcd0 a2=0 a3=ffff82cd76c0 items=0 ppid=1668 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Feb  9 18:30:46.765000 audit[1780]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.765000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0f36420 a2=0 a3=ffffadae76c0 items=0 ppid=1668 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Feb  9 18:30:46.768000 audit[1782]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.768000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffedd88a40 a2=0 a3=ffff8afb76c0 items=0 ppid=1668 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Feb  9 18:30:46.769000 audit[1783]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.769000 audit[1783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff8e34c00 a2=0 a3=ffff813356c0 items=0 ppid=1668 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Feb  9 18:30:46.772000 audit[1785]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.772000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd2d21670 a2=0 a3=ffff91ecf6c0 items=0 ppid=1668 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 18:30:46.775000 audit[1788]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.775000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffda09ec10 a2=0 a3=ffffa6bf76c0 items=0 ppid=1668 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Feb  9 18:30:46.779000 audit[1791]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.779000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffedc4670 a2=0 a3=ffffb1e7f6c0 items=0 ppid=1668 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Feb  9 18:30:46.780000 audit[1792]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.780000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff5565490 a2=0 a3=ffff9ed926c0 items=0 ppid=1668 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Feb  9 18:30:46.782000 audit[1794]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.782000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffca7b0140 a2=0 a3=ffffbb1286c0 items=0 ppid=1668 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 18:30:46.786000 audit[1797]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.786000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffba02150 a2=0 a3=ffffb07e46c0 items=0 ppid=1668 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 18:30:46.787000 audit[1798]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.787000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3339710 a2=0 a3=ffff91fb96c0 items=0 ppid=1668 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Feb  9 18:30:46.788000 audit[1800]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.788000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffefa65ad0 a2=0 a3=ffffba3cb6c0 items=0 ppid=1668 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Feb  9 18:30:46.789000 audit[1801]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.789000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0b31590 a2=0 a3=ffffa727e6c0 items=0 ppid=1668 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.789000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Feb  9 18:30:46.792000 audit[1803]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.792000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff4b99820 a2=0 a3=ffffaadbe6c0 items=0 ppid=1668 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 18:30:46.795000 audit[1806]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:30:46.795000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcb171360 a2=0 a3=ffffac7ed6c0 items=0 ppid=1668 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 18:30:46.798000 audit[1808]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Feb  9 18:30:46.798000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe6740c80 a2=0 a3=ffffbf3b16c0 items=0 ppid=1668 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.798000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:46.799000 audit[1808]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Feb  9 18:30:46.799000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffe6740c80 a2=0 a3=ffffbf3b16c0 items=0 ppid=1668 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:46.799000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:47.435223 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1864235676.mount: Deactivated successfully.
Feb  9 18:30:47.571595 kubelet[1442]: E0209 18:30:47.571555    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:47.677232 kubelet[1442]: E0209 18:30:47.677179    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:48.572352 kubelet[1442]: E0209 18:30:48.572304    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:48.658096 kubelet[1442]: E0209 18:30:48.658042    1442 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-snw99" podUID="c5573626-adbf-4afe-9dc3-8de1ed165bc5"
Feb  9 18:30:49.127104 env[1137]: time="2024-02-09T18:30:49.127043329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:49.128184 env[1137]: time="2024-02-09T18:30:49.128141917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:49.131968 env[1137]: time="2024-02-09T18:30:49.131926401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:49.133816 env[1137]: time="2024-02-09T18:30:49.133778791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:49.134308 env[1137]: time="2024-02-09T18:30:49.134273876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\""
Feb  9 18:30:49.136186 env[1137]: time="2024-02-09T18:30:49.136143567Z" level=info msg="CreateContainer within sandbox \"783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Feb  9 18:30:49.147107 env[1137]: time="2024-02-09T18:30:49.147054355Z" level=info msg="CreateContainer within sandbox \"783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde\""
Feb  9 18:30:49.147665 env[1137]: time="2024-02-09T18:30:49.147640200Z" level=info msg="StartContainer for \"ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde\""
Feb  9 18:30:49.166473 systemd[1]: run-containerd-runc-k8s.io-ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde-runc.fxDM4J.mount: Deactivated successfully.
Feb  9 18:30:49.168932 systemd[1]: Started cri-containerd-ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde.scope.
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190956 kernel: kauditd_printk_skb: 406 callbacks suppressed
Feb  9 18:30:49.191020 kernel: audit: type=1400 audit(1707503449.189:637): avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:49.195220 kernel: audit: type=1300 audit(1707503449.189:637): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:49.195270 kernel: audit: type=1327 audit(1707503449.189:637): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163356433626665623835636239383531326433633139643263623239
Feb  9 18:30:49.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163356433626665623835636239383531326433633139643263623239
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.199266 kernel: audit: type=1400 audit(1707503449.189:638): avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.199295 kernel: audit: type=1400 audit(1707503449.189:638): avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.202503 kernel: audit: type=1400 audit(1707503449.189:638): avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.205035 kernel: audit: type=1400 audit(1707503449.189:638): avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.206917 kernel: audit: type=1400 audit(1707503449.189:638): avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.208925 kernel: audit: type=1400 audit(1707503449.189:638): avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.208978 kernel: audit: type=1400 audit(1707503449.189:638): avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.189000 audit: BPF prog-id=75 op=LOAD
Feb  9 18:30:49.189000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1521 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:49.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163356433626665623835636239383531326433633139643263623239
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.190000 audit: BPF prog-id=76 op=LOAD
Feb  9 18:30:49.190000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1521 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:49.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163356433626665623835636239383531326433633139643263623239
Feb  9 18:30:49.192000 audit: BPF prog-id=76 op=UNLOAD
Feb  9 18:30:49.192000 audit: BPF prog-id=75 op=UNLOAD
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { perfmon } for  pid=1816 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit[1816]: AVC avc:  denied  { bpf } for  pid=1816 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:49.192000 audit: BPF prog-id=77 op=LOAD
Feb  9 18:30:49.192000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1521 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:49.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163356433626665623835636239383531326433633139643263623239
Feb  9 18:30:49.218113 env[1137]: time="2024-02-09T18:30:49.218074305Z" level=info msg="StartContainer for \"ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde\" returns successfully"
Feb  9 18:30:49.573079 kubelet[1442]: E0209 18:30:49.572967    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:49.682848 kubelet[1442]: E0209 18:30:49.682357    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:49.902106 env[1137]: time="2024-02-09T18:30:49.901540485Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Feb  9 18:30:49.903854 systemd[1]: cri-containerd-ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde.scope: Deactivated successfully.
Feb  9 18:30:49.908000 audit: BPF prog-id=77 op=UNLOAD
Feb  9 18:30:49.947629 kubelet[1442]: I0209 18:30:49.946954    1442 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Feb  9 18:30:50.123449 env[1137]: time="2024-02-09T18:30:50.123380805Z" level=info msg="shim disconnected" id=ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde
Feb  9 18:30:50.123449 env[1137]: time="2024-02-09T18:30:50.123431272Z" level=warning msg="cleaning up after shim disconnected" id=ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde namespace=k8s.io
Feb  9 18:30:50.123449 env[1137]: time="2024-02-09T18:30:50.123442655Z" level=info msg="cleaning up dead shim"
Feb  9 18:30:50.130475 env[1137]: time="2024-02-09T18:30:50.130424092Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:30:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1864 runtime=io.containerd.runc.v2\n"
Feb  9 18:30:50.144286 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ac5d3bfeb85cb98512d3c19d2cb29392b74bdfb6d2f519d2dbd8c13abf569bde-rootfs.mount: Deactivated successfully.
Feb  9 18:30:50.573885 kubelet[1442]: E0209 18:30:50.573834    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:50.662616 systemd[1]: Created slice kubepods-besteffort-podc5573626_adbf_4afe_9dc3_8de1ed165bc5.slice.
Feb  9 18:30:50.664322 env[1137]: time="2024-02-09T18:30:50.664282721Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-snw99,Uid:c5573626-adbf-4afe-9dc3-8de1ed165bc5,Namespace:calico-system,Attempt:0,}"
Feb  9 18:30:50.686204 kubelet[1442]: E0209 18:30:50.685996    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:50.686905 env[1137]: time="2024-02-09T18:30:50.686846959Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\""
Feb  9 18:30:50.721280 env[1137]: time="2024-02-09T18:30:50.721208715Z" level=error msg="Failed to destroy network for sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:50.721834 env[1137]: time="2024-02-09T18:30:50.721799875Z" level=error msg="encountered an error cleaning up failed sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:50.721961 env[1137]: time="2024-02-09T18:30:50.721933486Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-snw99,Uid:c5573626-adbf-4afe-9dc3-8de1ed165bc5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:50.722632 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57-shm.mount: Deactivated successfully.
Feb  9 18:30:50.723616 kubelet[1442]: E0209 18:30:50.723231    1442 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:50.723616 kubelet[1442]: E0209 18:30:50.723468    1442 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-snw99"
Feb  9 18:30:50.723616 kubelet[1442]: E0209 18:30:50.723492    1442 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-snw99"
Feb  9 18:30:50.723750 kubelet[1442]: E0209 18:30:50.723605    1442 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-snw99_calico-system(c5573626-adbf-4afe-9dc3-8de1ed165bc5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-snw99_calico-system(c5573626-adbf-4afe-9dc3-8de1ed165bc5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-snw99" podUID="c5573626-adbf-4afe-9dc3-8de1ed165bc5"
Feb  9 18:30:51.574789 kubelet[1442]: E0209 18:30:51.574746    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:51.688705 kubelet[1442]: I0209 18:30:51.688672    1442 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57"
Feb  9 18:30:51.691719 env[1137]: time="2024-02-09T18:30:51.691682698Z" level=info msg="StopPodSandbox for \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\""
Feb  9 18:30:51.801964 env[1137]: time="2024-02-09T18:30:51.801715595Z" level=error msg="StopPodSandbox for \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\" failed" error="failed to destroy network for sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:51.802112 kubelet[1442]: E0209 18:30:51.802004    1442 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57"
Feb  9 18:30:51.802112 kubelet[1442]: E0209 18:30:51.802075    1442 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57"}
Feb  9 18:30:51.802112 kubelet[1442]: E0209 18:30:51.802109    1442 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c5573626-adbf-4afe-9dc3-8de1ed165bc5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Feb  9 18:30:51.802235 kubelet[1442]: E0209 18:30:51.802137    1442 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c5573626-adbf-4afe-9dc3-8de1ed165bc5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-snw99" podUID="c5573626-adbf-4afe-9dc3-8de1ed165bc5"
Feb  9 18:30:52.575095 kubelet[1442]: E0209 18:30:52.575064    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:53.295139 kubelet[1442]: I0209 18:30:53.295097    1442 topology_manager.go:215] "Topology Admit Handler" podUID="d9e9e8c7-040e-4483-b707-c5bc0f991f92" podNamespace="default" podName="nginx-deployment-6d5f899847-t5phd"
Feb  9 18:30:53.299656 systemd[1]: Created slice kubepods-besteffort-podd9e9e8c7_040e_4483_b707_c5bc0f991f92.slice.
Feb  9 18:30:53.444358 kubelet[1442]: I0209 18:30:53.444325    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-flmfd\" (UniqueName: \"kubernetes.io/projected/d9e9e8c7-040e-4483-b707-c5bc0f991f92-kube-api-access-flmfd\") pod \"nginx-deployment-6d5f899847-t5phd\" (UID: \"d9e9e8c7-040e-4483-b707-c5bc0f991f92\") " pod="default/nginx-deployment-6d5f899847-t5phd"
Feb  9 18:30:53.576608 kubelet[1442]: E0209 18:30:53.576525    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:53.603263 env[1137]: time="2024-02-09T18:30:53.603216500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-t5phd,Uid:d9e9e8c7-040e-4483-b707-c5bc0f991f92,Namespace:default,Attempt:0,}"
Feb  9 18:30:53.840000 audit[1938]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:53.840000 audit[1938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe0032730 a2=0 a3=ffff91eca6c0 items=0 ppid=1668 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:53.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:53.850000 audit[1938]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:53.850000 audit[1938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe0032730 a2=0 a3=ffff91eca6c0 items=0 ppid=1668 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:53.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:53.865000 audit[1940]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:53.865000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe245c690 a2=0 a3=ffffa43fd6c0 items=0 ppid=1668 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:53.865000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:53.866000 audit[1940]: NETFILTER_CFG table=nat:68 family=2 entries=33 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:53.866000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13060 a0=3 a1=ffffe245c690 a2=0 a3=ffffa43fd6c0 items=0 ppid=1668 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:53.866000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:53.941007 env[1137]: time="2024-02-09T18:30:53.940946135Z" level=error msg="Failed to destroy network for sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:53.942875 env[1137]: time="2024-02-09T18:30:53.941322753Z" level=error msg="encountered an error cleaning up failed sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:53.942875 env[1137]: time="2024-02-09T18:30:53.941372307Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-t5phd,Uid:d9e9e8c7-040e-4483-b707-c5bc0f991f92,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:53.942314 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385-shm.mount: Deactivated successfully.
Feb  9 18:30:53.943084 kubelet[1442]: E0209 18:30:53.941636    1442 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:53.943084 kubelet[1442]: E0209 18:30:53.941690    1442 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-t5phd"
Feb  9 18:30:53.943084 kubelet[1442]: E0209 18:30:53.941714    1442 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-t5phd"
Feb  9 18:30:53.943165 kubelet[1442]: E0209 18:30:53.941763    1442 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-t5phd_default(d9e9e8c7-040e-4483-b707-c5bc0f991f92)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-t5phd_default(d9e9e8c7-040e-4483-b707-c5bc0f991f92)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-t5phd" podUID="d9e9e8c7-040e-4483-b707-c5bc0f991f92"
Feb  9 18:30:54.576946 kubelet[1442]: E0209 18:30:54.576895    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:54.696449 kubelet[1442]: I0209 18:30:54.695945    1442 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385"
Feb  9 18:30:54.696610 env[1137]: time="2024-02-09T18:30:54.696529717Z" level=info msg="StopPodSandbox for \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\""
Feb  9 18:30:54.717537 env[1137]: time="2024-02-09T18:30:54.717442013Z" level=error msg="StopPodSandbox for \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\" failed" error="failed to destroy network for sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 18:30:54.717945 kubelet[1442]: E0209 18:30:54.717795    1442 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385"
Feb  9 18:30:54.717945 kubelet[1442]: E0209 18:30:54.717838    1442 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385"}
Feb  9 18:30:54.717945 kubelet[1442]: E0209 18:30:54.717870    1442 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9e9e8c7-040e-4483-b707-c5bc0f991f92\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Feb  9 18:30:54.717945 kubelet[1442]: E0209 18:30:54.717902    1442 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9e9e8c7-040e-4483-b707-c5bc0f991f92\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-t5phd" podUID="d9e9e8c7-040e-4483-b707-c5bc0f991f92"
Feb  9 18:30:55.120396 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount734117385.mount: Deactivated successfully.
Feb  9 18:30:55.290421 env[1137]: time="2024-02-09T18:30:55.290362630Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:55.291635 env[1137]: time="2024-02-09T18:30:55.291607121Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:55.295083 env[1137]: time="2024-02-09T18:30:55.295051415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:55.296141 env[1137]: time="2024-02-09T18:30:55.296116925Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:30:55.296685 env[1137]: time="2024-02-09T18:30:55.296654188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\""
Feb  9 18:30:55.307400 env[1137]: time="2024-02-09T18:30:55.307365462Z" level=info msg="CreateContainer within sandbox \"783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Feb  9 18:30:55.318862 env[1137]: time="2024-02-09T18:30:55.318819432Z" level=info msg="CreateContainer within sandbox \"783bad4c200944ef80e241d7172f164f3763732af5fc027b5c0cac5af3e48609\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"579a4ecc0f4a921a08f2a93e3bed36046b803fdce633020641c449bc296efe4e\""
Feb  9 18:30:55.319283 env[1137]: time="2024-02-09T18:30:55.319241471Z" level=info msg="StartContainer for \"579a4ecc0f4a921a08f2a93e3bed36046b803fdce633020641c449bc296efe4e\""
Feb  9 18:30:55.333322 systemd[1]: Started cri-containerd-579a4ecc0f4a921a08f2a93e3bed36046b803fdce633020641c449bc296efe4e.scope.
Feb  9 18:30:55.356000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.360679 kernel: kauditd_printk_skb: 46 callbacks suppressed
Feb  9 18:30:55.360775 kernel: audit: type=1400 audit(1707503455.356:648): avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.360821 kernel: audit: type=1300 audit(1707503455.356:648): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.356000 audit[2014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.363239 kernel: audit: type=1327 audit(1707503455.356:648): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396134656363306634613932316130386632613933653362656433
Feb  9 18:30:55.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396134656363306634613932316130386632613933653362656433
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.367261 kernel: audit: type=1400 audit(1707503455.357:649): avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.367325 kernel: audit: type=1400 audit(1707503455.357:649): avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.368953 kernel: audit: type=1400 audit(1707503455.357:649): avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.372281 kernel: audit: type=1400 audit(1707503455.357:649): avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.372323 kernel: audit: type=1400 audit(1707503455.357:649): avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.376393 kernel: audit: type=1400 audit(1707503455.357:649): avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.376448 kernel: audit: type=1400 audit(1707503455.357:649): avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.357000 audit: BPF prog-id=78 op=LOAD
Feb  9 18:30:55.357000 audit[2014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1521 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396134656363306634613932316130386632613933653362656433
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.359000 audit: BPF prog-id=79 op=LOAD
Feb  9 18:30:55.359000 audit[2014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1521 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396134656363306634613932316130386632613933653362656433
Feb  9 18:30:55.361000 audit: BPF prog-id=79 op=UNLOAD
Feb  9 18:30:55.361000 audit: BPF prog-id=78 op=UNLOAD
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { perfmon } for  pid=2014 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit[2014]: AVC avc:  denied  { bpf } for  pid=2014 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:55.361000 audit: BPF prog-id=80 op=LOAD
Feb  9 18:30:55.361000 audit[2014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1521 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396134656363306634613932316130386632613933653362656433
Feb  9 18:30:55.388944 env[1137]: time="2024-02-09T18:30:55.388893793Z" level=info msg="StartContainer for \"579a4ecc0f4a921a08f2a93e3bed36046b803fdce633020641c449bc296efe4e\" returns successfully"
Feb  9 18:30:55.516974 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Feb  9 18:30:55.517081 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Feb  9 18:30:55.577668 kubelet[1442]: E0209 18:30:55.577620    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:55.700600 kubelet[1442]: E0209 18:30:55.700491    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:55.717582 kubelet[1442]: I0209 18:30:55.717528    1442 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-n9z7j" podStartSLOduration=2.955125109 podCreationTimestamp="2024-02-09 18:30:41 +0000 UTC" firstStartedPulling="2024-02-09 18:30:43.534643672 +0000 UTC m=+3.699445677" lastFinishedPulling="2024-02-09 18:30:55.296989529 +0000 UTC m=+15.461791574" observedRunningTime="2024-02-09 18:30:55.717433582 +0000 UTC m=+15.882235627" watchObservedRunningTime="2024-02-09 18:30:55.717471006 +0000 UTC m=+15.882273051"
Feb  9 18:30:55.829000 audit[2071]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:55.829000 audit[2071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc020acc0 a2=0 a3=ffffab7606c0 items=0 ppid=1668 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:55.830000 audit[2071]: NETFILTER_CFG table=nat:70 family=2 entries=42 op=nft_register_rule pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:55.830000 audit[2071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13060 a0=3 a1=ffffc020acc0 a2=0 a3=ffffab7606c0 items=0 ppid=1668 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:55.838000 audit[2073]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:55.838000 audit[2073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff3dfc6c0 a2=0 a3=ffff822076c0 items=0 ppid=1668 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:55.851000 audit[2073]: NETFILTER_CFG table=nat:72 family=2 entries=54 op=nft_register_chain pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:55.851000 audit[2073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18724 a0=3 a1=fffff3dfc6c0 a2=0 a3=ffff822076c0 items=0 ppid=1668 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:55.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:56.310667 systemd[1]: run-containerd-runc-k8s.io-579a4ecc0f4a921a08f2a93e3bed36046b803fdce633020641c449bc296efe4e-runc.VXbRMF.mount: Deactivated successfully.
Feb  9 18:30:56.578270 kubelet[1442]: E0209 18:30:56.577876    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:56.702447 kubelet[1442]: E0209 18:30:56.702409    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:56.776000 audit[2202]: AVC avc:  denied  { write } for  pid=2202 comm="tee" name="fd" dev="proc" ino=15442 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 18:30:56.776000 audit[2202]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeaff797c a2=241 a3=1b6 items=1 ppid=2149 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:56.776000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Feb  9 18:30:56.776000 audit: PATH item=0 name="/dev/fd/63" inode=15439 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:56.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 18:30:56.784000 audit[2197]: AVC avc:  denied  { write } for  pid=2197 comm="tee" name="fd" dev="proc" ino=14710 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 18:30:56.784000 audit[2197]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc55b798b a2=241 a3=1b6 items=1 ppid=2151 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:56.784000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Feb  9 18:30:56.784000 audit: PATH item=0 name="/dev/fd/63" inode=14702 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:56.784000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 18:30:56.785000 audit[2205]: AVC avc:  denied  { write } for  pid=2205 comm="tee" name="fd" dev="proc" ino=14714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 18:30:56.785000 audit[2205]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffda8898b a2=241 a3=1b6 items=1 ppid=2155 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:56.785000 audit: CWD cwd="/etc/service/enabled/confd/log"
Feb  9 18:30:56.785000 audit: PATH item=0 name="/dev/fd/63" inode=14705 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:56.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 18:30:56.797000 audit[2217]: AVC avc:  denied  { write } for  pid=2217 comm="tee" name="fd" dev="proc" ino=13169 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 18:30:56.797000 audit[2217]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec0a298b a2=241 a3=1b6 items=1 ppid=2162 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:56.797000 audit: CWD cwd="/etc/service/enabled/felix/log"
Feb  9 18:30:56.797000 audit: PATH item=0 name="/dev/fd/63" inode=13165 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:56.797000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 18:30:56.798000 audit[2219]: AVC avc:  denied  { write } for  pid=2219 comm="tee" name="fd" dev="proc" ino=13173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 18:30:56.798000 audit[2219]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd063098c a2=241 a3=1b6 items=1 ppid=2160 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:56.798000 audit: CWD cwd="/etc/service/enabled/bird/log"
Feb  9 18:30:56.798000 audit: PATH item=0 name="/dev/fd/63" inode=13166 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:56.798000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 18:30:56.810000 audit[2225]: AVC avc:  denied  { write } for  pid=2225 comm="tee" name="fd" dev="proc" ino=14227 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 18:30:56.810000 audit[2225]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe360398d a2=241 a3=1b6 items=1 ppid=2159 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:56.810000 audit: CWD cwd="/etc/service/enabled/cni/log"
Feb  9 18:30:56.810000 audit: PATH item=0 name="/dev/fd/63" inode=14224 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:56.810000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 18:30:56.811000 audit[2223]: AVC avc:  denied  { write } for  pid=2223 comm="tee" name="fd" dev="proc" ino=14718 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 18:30:56.811000 audit[2223]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd86f597b a2=241 a3=1b6 items=1 ppid=2154 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:56.811000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Feb  9 18:30:56.811000 audit: PATH item=0 name="/dev/fd/63" inode=14221 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:30:56.811000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 18:30:57.326000 audit[2245]: NETFILTER_CFG table=filter:73 family=2 entries=9 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:57.326000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffddd73360 a2=0 a3=ffff8663c6c0 items=0 ppid=1668 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:57.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:57.327000 audit[2245]: NETFILTER_CFG table=nat:74 family=2 entries=25 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:30:57.327000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8252 a0=3 a1=ffffddd73360 a2=0 a3=ffff8663c6c0 items=0 ppid=1668 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:57.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:30:57.578339 kubelet[1442]: E0209 18:30:57.578176    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:57.703805 kubelet[1442]: E0209 18:30:57.703761    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:30:57.992577 kernel: Initializing XFRM netlink socket
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.086000 audit: BPF prog-id=81 op=LOAD
Feb  9 18:30:58.086000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff04e1688 a2=70 a3=0 items=0 ppid=2307 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.086000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 18:30:58.087000 audit: BPF prog-id=81 op=UNLOAD
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit: BPF prog-id=82 op=LOAD
Feb  9 18:30:58.087000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff04e1688 a2=70 a3=4a174c items=0 ppid=2307 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 18:30:58.087000 audit: BPF prog-id=82 op=UNLOAD
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff04e16b8 a2=70 a3=d61279f items=0 ppid=2307 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { perfmon } for  pid=2362 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit[2362]: AVC avc:  denied  { bpf } for  pid=2362 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.087000 audit: BPF prog-id=83 op=LOAD
Feb  9 18:30:58.087000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff04e1608 a2=70 a3=d6127b9 items=0 ppid=2307 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 18:30:58.091000 audit[2364]: AVC avc:  denied  { bpf } for  pid=2364 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.091000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffda934a48 a2=70 a3=0 items=0 ppid=2307 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.091000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Feb  9 18:30:58.091000 audit[2364]: AVC avc:  denied  { bpf } for  pid=2364 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:30:58.091000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffda934928 a2=70 a3=2 items=0 ppid=2307 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.091000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Feb  9 18:30:58.100000 audit: BPF prog-id=83 op=UNLOAD
Feb  9 18:30:58.133000 audit[2390]: NETFILTER_CFG table=mangle:75 family=2 entries=19 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:30:58.133000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=fffffc800af0 a2=0 a3=ffffaf5e3fa8 items=0 ppid=2307 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.133000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:30:58.138000 audit[2391]: NETFILTER_CFG table=raw:76 family=2 entries=19 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:30:58.138000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffff5d72850 a2=0 a3=ffff9b21efa8 items=0 ppid=2307 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.138000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:30:58.143000 audit[2396]: NETFILTER_CFG table=nat:77 family=2 entries=16 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:30:58.143000 audit[2396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffffd97f7a0 a2=0 a3=ffff8a131fa8 items=0 ppid=2307 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.143000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:30:58.143000 audit[2393]: NETFILTER_CFG table=filter:78 family=2 entries=39 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:30:58.143000 audit[2393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd44b15d0 a2=0 a3=ffff9f289fa8 items=0 ppid=2307 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:30:58.143000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:30:58.578691 kubelet[1442]: E0209 18:30:58.578577    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:30:59.002291 systemd-networkd[1038]: vxlan.calico: Link UP
Feb  9 18:30:59.002298 systemd-networkd[1038]: vxlan.calico: Gained carrier
Feb  9 18:30:59.579142 kubelet[1442]: E0209 18:30:59.579100    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:00.566373 kubelet[1442]: E0209 18:31:00.566331    1442 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:00.579653 kubelet[1442]: E0209 18:31:00.579628    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:00.763209 systemd-networkd[1038]: vxlan.calico: Gained IPv6LL
Feb  9 18:31:01.580727 kubelet[1442]: E0209 18:31:01.580665    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:02.581496 kubelet[1442]: E0209 18:31:02.581462    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:03.582322 kubelet[1442]: E0209 18:31:03.582286    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:03.658590 env[1137]: time="2024-02-09T18:31:03.658551686Z" level=info msg="StopPodSandbox for \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\""
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.717 [INFO][2434] k8s.go 578: Cleaning up netns ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.717 [INFO][2434] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" iface="eth0" netns="/var/run/netns/cni-51af7178-f452-2213-a03f-8ff9842ab406"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.717 [INFO][2434] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" iface="eth0" netns="/var/run/netns/cni-51af7178-f452-2213-a03f-8ff9842ab406"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.718 [INFO][2434] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" iface="eth0" netns="/var/run/netns/cni-51af7178-f452-2213-a03f-8ff9842ab406"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.718 [INFO][2434] k8s.go 585: Releasing IP address(es) ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.718 [INFO][2434] utils.go 188: Calico CNI releasing IP address ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.766 [INFO][2442] ipam_plugin.go 415: Releasing address using handleID ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" HandleID="k8s-pod-network.27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" Workload="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.766 [INFO][2442] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.766 [INFO][2442] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.777 [WARNING][2442] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" HandleID="k8s-pod-network.27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" Workload="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.777 [INFO][2442] ipam_plugin.go 443: Releasing address using workloadID ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" HandleID="k8s-pod-network.27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57" Workload="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.779 [INFO][2442] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 18:31:03.781702 env[1137]: 2024-02-09 18:31:03.780 [INFO][2434] k8s.go 591: Teardown processing complete. ContainerID="27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57"
Feb  9 18:31:03.784159 env[1137]: time="2024-02-09T18:31:03.783880124Z" level=info msg="TearDown network for sandbox \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\" successfully"
Feb  9 18:31:03.784159 env[1137]: time="2024-02-09T18:31:03.783913735Z" level=info msg="StopPodSandbox for \"27842c2cd0084c727b1e2cc942057b525d7d7898cd964bd3e6db57b7db8b6f57\" returns successfully"
Feb  9 18:31:03.783168 systemd[1]: run-netns-cni\x2d51af7178\x2df452\x2d2213\x2da03f\x2d8ff9842ab406.mount: Deactivated successfully.
Feb  9 18:31:03.784554 env[1137]: time="2024-02-09T18:31:03.784502217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-snw99,Uid:c5573626-adbf-4afe-9dc3-8de1ed165bc5,Namespace:calico-system,Attempt:1,}"
Feb  9 18:31:03.906114 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 18:31:03.906201 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali58a3bfe1d5d: link becomes ready
Feb  9 18:31:03.905131 systemd-networkd[1038]: cali58a3bfe1d5d: Link UP
Feb  9 18:31:03.906555 systemd-networkd[1038]: cali58a3bfe1d5d: Gained carrier
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.833 [INFO][2450] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.69-k8s-csi--node--driver--snw99-eth0 csi-node-driver- calico-system  c5573626-adbf-4afe-9dc3-8de1ed165bc5 898 0 2024-02-09 18:30:42 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.0.0.69  csi-node-driver-snw99 eth0 default [] []   [kns.calico-system ksa.calico-system.default] cali58a3bfe1d5d  [] []}} ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Namespace="calico-system" Pod="csi-node-driver-snw99" WorkloadEndpoint="10.0.0.69-k8s-csi--node--driver--snw99-"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.833 [INFO][2450] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Namespace="calico-system" Pod="csi-node-driver-snw99" WorkloadEndpoint="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.861 [INFO][2463] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" HandleID="k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Workload="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.876 [INFO][2463] ipam_plugin.go 268: Auto assigning IP ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" HandleID="k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Workload="10.0.0.69-k8s-csi--node--driver--snw99-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004df860), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.69", "pod":"csi-node-driver-snw99", "timestamp":"2024-02-09 18:31:03.861607323 +0000 UTC"}, Hostname:"10.0.0.69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.876 [INFO][2463] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.876 [INFO][2463] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.876 [INFO][2463] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.69'
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.878 [INFO][2463] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.882 [INFO][2463] ipam.go 372: Looking up existing affinities for host host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.886 [INFO][2463] ipam.go 489: Trying affinity for 192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.888 [INFO][2463] ipam.go 155: Attempting to load block cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.890 [INFO][2463] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.890 [INFO][2463] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.0/26 handle="k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.891 [INFO][2463] ipam.go 1682: Creating new handle: k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.894 [INFO][2463] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.0/26 handle="k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.899 [INFO][2463] ipam.go 1216: Successfully claimed IPs: [192.168.121.1/26] block=192.168.121.0/26 handle="k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.899 [INFO][2463] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.1/26] handle="k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" host="10.0.0.69"
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.899 [INFO][2463] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 18:31:03.914981 env[1137]: 2024-02-09 18:31:03.899 [INFO][2463] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.1/26] IPv6=[] ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" HandleID="k8s-pod-network.8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Workload="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.918496 env[1137]: 2024-02-09 18:31:03.901 [INFO][2450] k8s.go 385: Populated endpoint ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Namespace="calico-system" Pod="csi-node-driver-snw99" WorkloadEndpoint="10.0.0.69-k8s-csi--node--driver--snw99-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-csi--node--driver--snw99-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c5573626-adbf-4afe-9dc3-8de1ed165bc5", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 30, 42, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"", Pod:"csi-node-driver-snw99", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali58a3bfe1d5d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:03.918496 env[1137]: 2024-02-09 18:31:03.901 [INFO][2450] k8s.go 386: Calico CNI using IPs: [192.168.121.1/32] ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Namespace="calico-system" Pod="csi-node-driver-snw99" WorkloadEndpoint="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.918496 env[1137]: 2024-02-09 18:31:03.901 [INFO][2450] dataplane_linux.go 68: Setting the host side veth name to cali58a3bfe1d5d ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Namespace="calico-system" Pod="csi-node-driver-snw99" WorkloadEndpoint="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.918496 env[1137]: 2024-02-09 18:31:03.906 [INFO][2450] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Namespace="calico-system" Pod="csi-node-driver-snw99" WorkloadEndpoint="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.918496 env[1137]: 2024-02-09 18:31:03.907 [INFO][2450] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Namespace="calico-system" Pod="csi-node-driver-snw99" WorkloadEndpoint="10.0.0.69-k8s-csi--node--driver--snw99-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-csi--node--driver--snw99-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c5573626-adbf-4afe-9dc3-8de1ed165bc5", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 30, 42, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53", Pod:"csi-node-driver-snw99", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali58a3bfe1d5d", MAC:"a2:25:65:f2:69:35", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:03.918496 env[1137]: 2024-02-09 18:31:03.913 [INFO][2450] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53" Namespace="calico-system" Pod="csi-node-driver-snw99" WorkloadEndpoint="10.0.0.69-k8s-csi--node--driver--snw99-eth0"
Feb  9 18:31:03.926000 audit[2489]: NETFILTER_CFG table=filter:79 family=2 entries=36 op=nft_register_chain pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:31:03.929808 kernel: kauditd_printk_skb: 147 callbacks suppressed
Feb  9 18:31:03.929879 kernel: audit: type=1325 audit(1707503463.926:680): table=filter:79 family=2 entries=36 op=nft_register_chain pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:31:03.929900 kernel: audit: type=1300 audit(1707503463.926:680): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff49ccec0 a2=0 a3=ffffa9179fa8 items=0 ppid=2307 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:03.926000 audit[2489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff49ccec0 a2=0 a3=ffffa9179fa8 items=0 ppid=2307 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:03.926000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:31:03.934118 kernel: audit: type=1327 audit(1707503463.926:680): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:31:03.936828 env[1137]: time="2024-02-09T18:31:03.936765500Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:31:03.936980 env[1137]: time="2024-02-09T18:31:03.936953735Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:31:03.937080 env[1137]: time="2024-02-09T18:31:03.937051289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:31:03.937301 env[1137]: time="2024-02-09T18:31:03.937267579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53 pid=2498 runtime=io.containerd.runc.v2
Feb  9 18:31:03.952043 systemd[1]: Started cri-containerd-8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53.scope.
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.976497 kernel: audit: type=1400 audit(1707503463.971:681): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.976573 kernel: audit: type=1400 audit(1707503463.971:682): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.976593 kernel: audit: type=1400 audit(1707503463.971:683): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.978171 kernel: audit: type=1400 audit(1707503463.971:684): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.981593 kernel: audit: type=1400 audit(1707503463.971:685): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.981648 kernel: audit: type=1400 audit(1707503463.971:686): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.981757 systemd-resolved[1089]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Feb  9 18:31:03.983323 kernel: audit: type=1400 audit(1707503463.971:687): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit: BPF prog-id=84 op=LOAD
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:03.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373564313365363662346437363632353066313736373163363266
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:03.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373564313365363662346437363632353066313736373163363266
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.971000 audit: BPF prog-id=85 op=LOAD
Feb  9 18:31:03.971000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:03.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373564313365363662346437363632353066313736373163363266
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.973000 audit: BPF prog-id=86 op=LOAD
Feb  9 18:31:03.973000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:03.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373564313365363662346437363632353066313736373163363266
Feb  9 18:31:03.974000 audit: BPF prog-id=86 op=UNLOAD
Feb  9 18:31:03.974000 audit: BPF prog-id=85 op=UNLOAD
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { perfmon } for  pid=2508 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit[2508]: AVC avc:  denied  { bpf } for  pid=2508 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:03.975000 audit: BPF prog-id=87 op=LOAD
Feb  9 18:31:03.975000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:03.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373564313365363662346437363632353066313736373163363266
Feb  9 18:31:03.993570 env[1137]: time="2024-02-09T18:31:03.993524010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-snw99,Uid:c5573626-adbf-4afe-9dc3-8de1ed165bc5,Namespace:calico-system,Attempt:1,} returns sandbox id \"8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53\""
Feb  9 18:31:03.994812 env[1137]: time="2024-02-09T18:31:03.994785821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\""
Feb  9 18:31:04.583249 kubelet[1442]: E0209 18:31:04.583201    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:04.783250 systemd[1]: run-containerd-runc-k8s.io-8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53-runc.5lWPYG.mount: Deactivated successfully.
Feb  9 18:31:04.981903 env[1137]: time="2024-02-09T18:31:04.981782252Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:04.983381 env[1137]: time="2024-02-09T18:31:04.983353244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:04.984855 env[1137]: time="2024-02-09T18:31:04.984833945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:04.986190 env[1137]: time="2024-02-09T18:31:04.986152571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:04.986593 env[1137]: time="2024-02-09T18:31:04.986564135Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\""
Feb  9 18:31:04.988429 env[1137]: time="2024-02-09T18:31:04.988400443Z" level=info msg="CreateContainer within sandbox \"8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}"
Feb  9 18:31:05.001548 env[1137]: time="2024-02-09T18:31:05.001498370Z" level=info msg="CreateContainer within sandbox \"8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e8ec2549c1ab09bdf76285bb0e90a4a5b29887c335afc45a597348e40b04c677\""
Feb  9 18:31:05.002140 env[1137]: time="2024-02-09T18:31:05.002116112Z" level=info msg="StartContainer for \"e8ec2549c1ab09bdf76285bb0e90a4a5b29887c335afc45a597348e40b04c677\""
Feb  9 18:31:05.018420 systemd[1]: Started cri-containerd-e8ec2549c1ab09bdf76285bb0e90a4a5b29887c335afc45a597348e40b04c677.scope.
Feb  9 18:31:05.039000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.039000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2498 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:05.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538656332353439633161623039626466373632383562623065393061
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit: BPF prog-id=88 op=LOAD
Feb  9 18:31:05.040000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2498 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:05.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538656332353439633161623039626466373632383562623065393061
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.040000 audit: BPF prog-id=89 op=LOAD
Feb  9 18:31:05.040000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2498 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:05.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538656332353439633161623039626466373632383562623065393061
Feb  9 18:31:05.041000 audit: BPF prog-id=89 op=UNLOAD
Feb  9 18:31:05.041000 audit: BPF prog-id=88 op=UNLOAD
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { perfmon } for  pid=2541 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit[2541]: AVC avc:  denied  { bpf } for  pid=2541 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:05.041000 audit: BPF prog-id=90 op=LOAD
Feb  9 18:31:05.041000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2498 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:05.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538656332353439633161623039626466373632383562623065393061
Feb  9 18:31:05.061524 env[1137]: time="2024-02-09T18:31:05.061464381Z" level=info msg="StartContainer for \"e8ec2549c1ab09bdf76285bb0e90a4a5b29887c335afc45a597348e40b04c677\" returns successfully"
Feb  9 18:31:05.062668 env[1137]: time="2024-02-09T18:31:05.062632635Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\""
Feb  9 18:31:05.306776 systemd-networkd[1038]: cali58a3bfe1d5d: Gained IPv6LL
Feb  9 18:31:05.584109 kubelet[1442]: E0209 18:31:05.583999    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:06.107805 env[1137]: time="2024-02-09T18:31:06.107757172Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:06.109269 env[1137]: time="2024-02-09T18:31:06.109232312Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:06.110588 env[1137]: time="2024-02-09T18:31:06.110558742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:06.112381 env[1137]: time="2024-02-09T18:31:06.112351267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:06.112782 env[1137]: time="2024-02-09T18:31:06.112754749Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\""
Feb  9 18:31:06.114453 env[1137]: time="2024-02-09T18:31:06.114408606Z" level=info msg="CreateContainer within sandbox \"8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}"
Feb  9 18:31:06.128690 env[1137]: time="2024-02-09T18:31:06.128637503Z" level=info msg="CreateContainer within sandbox \"8e75d13e66b4d766250f17671c62fa383af205d0c2032abcdb4a33a308d06d53\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5e64835c5aa2c1f426188b95e6191c43c7750dbeabf4e0fb715abe6a09116727\""
Feb  9 18:31:06.129291 env[1137]: time="2024-02-09T18:31:06.129239106Z" level=info msg="StartContainer for \"5e64835c5aa2c1f426188b95e6191c43c7750dbeabf4e0fb715abe6a09116727\""
Feb  9 18:31:06.145715 systemd[1]: Started cri-containerd-5e64835c5aa2c1f426188b95e6191c43c7750dbeabf4e0fb715abe6a09116727.scope.
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2498 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:06.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363438333563356161326331663432363138386239356536313931
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.170000 audit: BPF prog-id=91 op=LOAD
Feb  9 18:31:06.170000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2498 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:06.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363438333563356161326331663432363138386239356536313931
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.171000 audit: BPF prog-id=92 op=LOAD
Feb  9 18:31:06.171000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2498 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:06.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363438333563356161326331663432363138386239356536313931
Feb  9 18:31:06.172000 audit: BPF prog-id=92 op=UNLOAD
Feb  9 18:31:06.172000 audit: BPF prog-id=91 op=UNLOAD
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { perfmon } for  pid=2577 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit[2577]: AVC avc:  denied  { bpf } for  pid=2577 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:06.172000 audit: BPF prog-id=93 op=LOAD
Feb  9 18:31:06.172000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2498 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:06.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363438333563356161326331663432363138386239356536313931
Feb  9 18:31:06.191553 env[1137]: time="2024-02-09T18:31:06.188520736Z" level=info msg="StartContainer for \"5e64835c5aa2c1f426188b95e6191c43c7750dbeabf4e0fb715abe6a09116727\" returns successfully"
Feb  9 18:31:06.584281 kubelet[1442]: E0209 18:31:06.584143    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:06.634692 kubelet[1442]: I0209 18:31:06.634622    1442 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0
Feb  9 18:31:06.634806 kubelet[1442]: I0209 18:31:06.634719    1442 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock
Feb  9 18:31:06.732334 kubelet[1442]: I0209 18:31:06.732287    1442 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-snw99" podStartSLOduration=22.613751833 podCreationTimestamp="2024-02-09 18:30:42 +0000 UTC" firstStartedPulling="2024-02-09 18:31:03.99450295 +0000 UTC m=+24.159304995" lastFinishedPulling="2024-02-09 18:31:06.113000639 +0000 UTC m=+26.277802684" observedRunningTime="2024-02-09 18:31:06.731958823 +0000 UTC m=+26.896760868" watchObservedRunningTime="2024-02-09 18:31:06.732249522 +0000 UTC m=+26.897051567"
Feb  9 18:31:07.584621 kubelet[1442]: E0209 18:31:07.584569    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:08.585580 kubelet[1442]: E0209 18:31:08.585537    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:09.586704 kubelet[1442]: E0209 18:31:09.586649    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:09.658819 env[1137]: time="2024-02-09T18:31:09.658780719Z" level=info msg="StopPodSandbox for \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\""
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.696 [INFO][2635] k8s.go 578: Cleaning up netns ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.696 [INFO][2635] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" iface="eth0" netns="/var/run/netns/cni-22fa673a-871c-3625-7617-b0959e687198"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.697 [INFO][2635] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" iface="eth0" netns="/var/run/netns/cni-22fa673a-871c-3625-7617-b0959e687198"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.697 [INFO][2635] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" iface="eth0" netns="/var/run/netns/cni-22fa673a-871c-3625-7617-b0959e687198"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.697 [INFO][2635] k8s.go 585: Releasing IP address(es) ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.697 [INFO][2635] utils.go 188: Calico CNI releasing IP address ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.713 [INFO][2643] ipam_plugin.go 415: Releasing address using handleID ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" HandleID="k8s-pod-network.954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" Workload="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.713 [INFO][2643] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.714 [INFO][2643] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.723 [WARNING][2643] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" HandleID="k8s-pod-network.954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" Workload="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.723 [INFO][2643] ipam_plugin.go 443: Releasing address using workloadID ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" HandleID="k8s-pod-network.954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385" Workload="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.724 [INFO][2643] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 18:31:09.727161 env[1137]: 2024-02-09 18:31:09.726 [INFO][2635] k8s.go 591: Teardown processing complete. ContainerID="954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385"
Feb  9 18:31:09.728390 systemd[1]: run-netns-cni\x2d22fa673a\x2d871c\x2d3625\x2d7617\x2db0959e687198.mount: Deactivated successfully.
Feb  9 18:31:09.729047 env[1137]: time="2024-02-09T18:31:09.728994019Z" level=info msg="TearDown network for sandbox \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\" successfully"
Feb  9 18:31:09.729047 env[1137]: time="2024-02-09T18:31:09.729036026Z" level=info msg="StopPodSandbox for \"954a9668cf7e4cd146a55acf0fa3daad94ff7decebe55c75e760e5fb9ccd3385\" returns successfully"
Feb  9 18:31:09.729607 env[1137]: time="2024-02-09T18:31:09.729554915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-t5phd,Uid:d9e9e8c7-040e-4483-b707-c5bc0f991f92,Namespace:default,Attempt:1,}"
Feb  9 18:31:09.833968 systemd-networkd[1038]: cali7b5a3bf6871: Link UP
Feb  9 18:31:09.835122 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 18:31:09.835188 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7b5a3bf6871: link becomes ready
Feb  9 18:31:09.835325 systemd-networkd[1038]: cali7b5a3bf6871: Gained carrier
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.769 [INFO][2651] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0 nginx-deployment-6d5f899847- default  d9e9e8c7-040e-4483-b707-c5bc0f991f92 927 0 2024-02-09 18:30:53 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.0.0.69  nginx-deployment-6d5f899847-t5phd eth0 default [] []   [kns.default ksa.default.default] cali7b5a3bf6871  [] []}} ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Namespace="default" Pod="nginx-deployment-6d5f899847-t5phd" WorkloadEndpoint="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.770 [INFO][2651] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Namespace="default" Pod="nginx-deployment-6d5f899847-t5phd" WorkloadEndpoint="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.793 [INFO][2667] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" HandleID="k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Workload="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.806 [INFO][2667] ipam_plugin.go 268: Auto assigning IP ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" HandleID="k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Workload="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d410), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.69", "pod":"nginx-deployment-6d5f899847-t5phd", "timestamp":"2024-02-09 18:31:09.793095228 +0000 UTC"}, Hostname:"10.0.0.69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.806 [INFO][2667] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.806 [INFO][2667] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.807 [INFO][2667] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.69'
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.808 [INFO][2667] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.812 [INFO][2667] ipam.go 372: Looking up existing affinities for host host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.816 [INFO][2667] ipam.go 489: Trying affinity for 192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.817 [INFO][2667] ipam.go 155: Attempting to load block cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.819 [INFO][2667] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.819 [INFO][2667] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.0/26 handle="k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.821 [INFO][2667] ipam.go 1682: Creating new handle: k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.824 [INFO][2667] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.0/26 handle="k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.829 [INFO][2667] ipam.go 1216: Successfully claimed IPs: [192.168.121.2/26] block=192.168.121.0/26 handle="k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.829 [INFO][2667] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.2/26] handle="k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" host="10.0.0.69"
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.829 [INFO][2667] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 18:31:09.844534 env[1137]: 2024-02-09 18:31:09.829 [INFO][2667] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.2/26] IPv6=[] ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" HandleID="k8s-pod-network.43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Workload="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.845232 env[1137]: 2024-02-09 18:31:09.830 [INFO][2651] k8s.go 385: Populated endpoint ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Namespace="default" Pod="nginx-deployment-6d5f899847-t5phd" WorkloadEndpoint="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"d9e9e8c7-040e-4483-b707-c5bc0f991f92", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 30, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"", Pod:"nginx-deployment-6d5f899847-t5phd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7b5a3bf6871", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:09.845232 env[1137]: 2024-02-09 18:31:09.830 [INFO][2651] k8s.go 386: Calico CNI using IPs: [192.168.121.2/32] ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Namespace="default" Pod="nginx-deployment-6d5f899847-t5phd" WorkloadEndpoint="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.845232 env[1137]: 2024-02-09 18:31:09.830 [INFO][2651] dataplane_linux.go 68: Setting the host side veth name to cali7b5a3bf6871 ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Namespace="default" Pod="nginx-deployment-6d5f899847-t5phd" WorkloadEndpoint="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.845232 env[1137]: 2024-02-09 18:31:09.835 [INFO][2651] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Namespace="default" Pod="nginx-deployment-6d5f899847-t5phd" WorkloadEndpoint="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.845232 env[1137]: 2024-02-09 18:31:09.835 [INFO][2651] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Namespace="default" Pod="nginx-deployment-6d5f899847-t5phd" WorkloadEndpoint="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"d9e9e8c7-040e-4483-b707-c5bc0f991f92", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 30, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242", Pod:"nginx-deployment-6d5f899847-t5phd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7b5a3bf6871", MAC:"6a:0b:ec:21:a2:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:09.845232 env[1137]: 2024-02-09 18:31:09.841 [INFO][2651] k8s.go 491: Wrote updated endpoint to datastore ContainerID="43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242" Namespace="default" Pod="nginx-deployment-6d5f899847-t5phd" WorkloadEndpoint="10.0.0.69-k8s-nginx--deployment--6d5f899847--t5phd-eth0"
Feb  9 18:31:09.854000 audit[2693]: NETFILTER_CFG table=filter:80 family=2 entries=40 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:31:09.857180 env[1137]: time="2024-02-09T18:31:09.857120865Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:31:09.857281 env[1137]: time="2024-02-09T18:31:09.857158991Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:31:09.857281 env[1137]: time="2024-02-09T18:31:09.857185516Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:31:09.857493 env[1137]: time="2024-02-09T18:31:09.857453762Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242 pid=2698 runtime=io.containerd.runc.v2
Feb  9 18:31:09.857883 kernel: kauditd_printk_skb: 136 callbacks suppressed
Feb  9 18:31:09.857941 kernel: audit: type=1325 audit(1707503469.854:711): table=filter:80 family=2 entries=40 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:31:09.857965 kernel: audit: type=1300 audit(1707503469.854:711): arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=ffffcf4aa680 a2=0 a3=ffff93129fa8 items=0 ppid=2307 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:09.854000 audit[2693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=ffffcf4aa680 a2=0 a3=ffff93129fa8 items=0 ppid=2307 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:09.860646 kernel: audit: type=1327 audit(1707503469.854:711): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:31:09.854000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:31:09.875083 systemd[1]: Started cri-containerd-43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242.scope.
Feb  9 18:31:09.892000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.892000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.898345 kernel: audit: type=1400 audit(1707503469.892:712): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.898406 kernel: audit: type=1400 audit(1707503469.892:713): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.898427 kernel: audit: type=1400 audit(1707503469.893:714): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.901903 kernel: audit: type=1400 audit(1707503469.893:715): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.901954 kernel: audit: type=1400 audit(1707503469.893:716): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.903749 systemd-resolved[1089]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Feb  9 18:31:09.905502 kernel: audit: type=1400 audit(1707503469.893:717): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.905548 kernel: audit: type=1400 audit(1707503469.893:718): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit: BPF prog-id=94 op=LOAD
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2698 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:09.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623661383434323535616635316135386264643337373961306462
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2698 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:09.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623661383434323535616635316135386264643337373961306462
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.893000 audit: BPF prog-id=95 op=LOAD
Feb  9 18:31:09.893000 audit[2708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2698 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:09.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623661383434323535616635316135386264643337373961306462
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.895000 audit: BPF prog-id=96 op=LOAD
Feb  9 18:31:09.895000 audit[2708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2698 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:09.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623661383434323535616635316135386264643337373961306462
Feb  9 18:31:09.896000 audit: BPF prog-id=96 op=UNLOAD
Feb  9 18:31:09.896000 audit: BPF prog-id=95 op=UNLOAD
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { perfmon } for  pid=2708 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit[2708]: AVC avc:  denied  { bpf } for  pid=2708 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:09.896000 audit: BPF prog-id=97 op=LOAD
Feb  9 18:31:09.896000 audit[2708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2698 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:09.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623661383434323535616635316135386264643337373961306462
Feb  9 18:31:09.920494 env[1137]: time="2024-02-09T18:31:09.920457423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-t5phd,Uid:d9e9e8c7-040e-4483-b707-c5bc0f991f92,Namespace:default,Attempt:1,} returns sandbox id \"43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242\""
Feb  9 18:31:09.922205 env[1137]: time="2024-02-09T18:31:09.922175158Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Feb  9 18:31:10.587157 kubelet[1442]: E0209 18:31:10.587108    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:10.728553 systemd[1]: run-containerd-runc-k8s.io-43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242-runc.wu5QmL.mount: Deactivated successfully.
Feb  9 18:31:11.450831 systemd-networkd[1038]: cali7b5a3bf6871: Gained IPv6LL
Feb  9 18:31:11.588280 kubelet[1442]: E0209 18:31:11.588223    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:11.940231 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3037063040.mount: Deactivated successfully.
Feb  9 18:31:12.588445 kubelet[1442]: E0209 18:31:12.588393    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:12.782094 env[1137]: time="2024-02-09T18:31:12.782049732Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:12.783412 env[1137]: time="2024-02-09T18:31:12.783367444Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:12.785749 env[1137]: time="2024-02-09T18:31:12.785723546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:12.787455 env[1137]: time="2024-02-09T18:31:12.787415513Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:12.788065 env[1137]: time="2024-02-09T18:31:12.788020361Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\""
Feb  9 18:31:12.789775 env[1137]: time="2024-02-09T18:31:12.789743371Z" level=info msg="CreateContainer within sandbox \"43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242\" for container &ContainerMetadata{Name:nginx,Attempt:0,}"
Feb  9 18:31:12.798109 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount780871885.mount: Deactivated successfully.
Feb  9 18:31:12.799310 env[1137]: time="2024-02-09T18:31:12.799271118Z" level=info msg="CreateContainer within sandbox \"43b6a844255af51a58bdd3779a0dbdf3665c579231e2e8abd495ed4587b7d242\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"44f8a515e927fa186d1bdd0cfc84f4684028a37a1ff0381cb8f15032659fed56\""
Feb  9 18:31:12.799767 env[1137]: time="2024-02-09T18:31:12.799727424Z" level=info msg="StartContainer for \"44f8a515e927fa186d1bdd0cfc84f4684028a37a1ff0381cb8f15032659fed56\""
Feb  9 18:31:12.816876 systemd[1]: Started cri-containerd-44f8a515e927fa186d1bdd0cfc84f4684028a37a1ff0381cb8f15032659fed56.scope.
Feb  9 18:31:12.849000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit: BPF prog-id=98 op=LOAD
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2698 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:12.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434663861353135653932376661313836643162646430636663383466
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2698 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:12.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434663861353135653932376661313836643162646430636663383466
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.850000 audit: BPF prog-id=99 op=LOAD
Feb  9 18:31:12.850000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2698 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:12.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434663861353135653932376661313836643162646430636663383466
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.852000 audit: BPF prog-id=100 op=LOAD
Feb  9 18:31:12.852000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2698 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:12.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434663861353135653932376661313836643162646430636663383466
Feb  9 18:31:12.853000 audit: BPF prog-id=100 op=UNLOAD
Feb  9 18:31:12.853000 audit: BPF prog-id=99 op=UNLOAD
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { perfmon } for  pid=2739 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit[2739]: AVC avc:  denied  { bpf } for  pid=2739 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:12.853000 audit: BPF prog-id=101 op=LOAD
Feb  9 18:31:12.853000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2698 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:12.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434663861353135653932376661313836643162646430636663383466
Feb  9 18:31:12.883893 env[1137]: time="2024-02-09T18:31:12.883833742Z" level=info msg="StartContainer for \"44f8a515e927fa186d1bdd0cfc84f4684028a37a1ff0381cb8f15032659fed56\" returns successfully"
Feb  9 18:31:12.940333 systemd[1]: run-containerd-runc-k8s.io-44f8a515e927fa186d1bdd0cfc84f4684028a37a1ff0381cb8f15032659fed56-runc.stI5kH.mount: Deactivated successfully.
Feb  9 18:31:13.589251 kubelet[1442]: E0209 18:31:13.589197    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:13.745526 kubelet[1442]: I0209 18:31:13.745479    1442 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-t5phd" podStartSLOduration=17.878895874 podCreationTimestamp="2024-02-09 18:30:53 +0000 UTC" firstStartedPulling="2024-02-09 18:31:09.921703237 +0000 UTC m=+30.086505282" lastFinishedPulling="2024-02-09 18:31:12.788255995 +0000 UTC m=+32.953058040" observedRunningTime="2024-02-09 18:31:13.745345738 +0000 UTC m=+33.910147783" watchObservedRunningTime="2024-02-09 18:31:13.745448632 +0000 UTC m=+33.910250677"
Feb  9 18:31:14.590248 kubelet[1442]: E0209 18:31:14.590196    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:15.296000 audit[2792]: NETFILTER_CFG table=filter:81 family=2 entries=20 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:15.298889 kernel: kauditd_printk_skb: 107 callbacks suppressed
Feb  9 18:31:15.298961 kernel: audit: type=1325 audit(1707503475.296:748): table=filter:81 family=2 entries=20 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:15.296000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc23a11b0 a2=0 a3=ffff9b06f6c0 items=0 ppid=1668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.303121 kernel: audit: type=1300 audit(1707503475.296:748): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc23a11b0 a2=0 a3=ffff9b06f6c0 items=0 ppid=1668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.303175 kernel: audit: type=1327 audit(1707503475.296:748): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:15.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:15.298000 audit[2792]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:15.298000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc23a11b0 a2=0 a3=ffff9b06f6c0 items=0 ppid=1668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.314888 kernel: audit: type=1325 audit(1707503475.298:749): table=nat:82 family=2 entries=20 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:15.314956 kernel: audit: type=1300 audit(1707503475.298:749): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc23a11b0 a2=0 a3=ffff9b06f6c0 items=0 ppid=1668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.314979 kernel: audit: type=1327 audit(1707503475.298:749): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:15.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:15.315000 audit[2794]: NETFILTER_CFG table=filter:83 family=2 entries=32 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:15.315000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc3d66da0 a2=0 a3=ffffafeda6c0 items=0 ppid=1668 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.325897 kernel: audit: type=1325 audit(1707503475.315:750): table=filter:83 family=2 entries=32 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:15.325945 kernel: audit: type=1300 audit(1707503475.315:750): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc3d66da0 a2=0 a3=ffffafeda6c0 items=0 ppid=1668 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.325963 kernel: audit: type=1327 audit(1707503475.315:750): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:15.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:15.334413 kubelet[1442]: I0209 18:31:15.334352    1442 topology_manager.go:215] "Topology Admit Handler" podUID="34cd5b48-f7d9-4fcf-b902-b5c69b6731d9" podNamespace="default" podName="nfs-server-provisioner-0"
Feb  9 18:31:15.320000 audit[2794]: NETFILTER_CFG table=nat:84 family=2 entries=20 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:15.320000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc3d66da0 a2=0 a3=ffffafeda6c0 items=0 ppid=1668 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:15.338533 kernel: audit: type=1325 audit(1707503475.320:751): table=nat:84 family=2 entries=20 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:15.340799 systemd[1]: Created slice kubepods-besteffort-pod34cd5b48_f7d9_4fcf_b902_b5c69b6731d9.slice.
Feb  9 18:31:15.438912 kubelet[1442]: I0209 18:31:15.438872    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/34cd5b48-f7d9-4fcf-b902-b5c69b6731d9-data\") pod \"nfs-server-provisioner-0\" (UID: \"34cd5b48-f7d9-4fcf-b902-b5c69b6731d9\") " pod="default/nfs-server-provisioner-0"
Feb  9 18:31:15.439038 kubelet[1442]: I0209 18:31:15.438965    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n5mq2\" (UniqueName: \"kubernetes.io/projected/34cd5b48-f7d9-4fcf-b902-b5c69b6731d9-kube-api-access-n5mq2\") pod \"nfs-server-provisioner-0\" (UID: \"34cd5b48-f7d9-4fcf-b902-b5c69b6731d9\") " pod="default/nfs-server-provisioner-0"
Feb  9 18:31:15.591355 kubelet[1442]: E0209 18:31:15.591246    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:15.643038 env[1137]: time="2024-02-09T18:31:15.642980627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:34cd5b48-f7d9-4fcf-b902-b5c69b6731d9,Namespace:default,Attempt:0,}"
Feb  9 18:31:15.748280 systemd-networkd[1038]: cali60e51b789ff: Link UP
Feb  9 18:31:15.750141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 18:31:15.750186 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready
Feb  9 18:31:15.749948 systemd-networkd[1038]: cali60e51b789ff: Gained carrier
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.685 [INFO][2796] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.69-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default  34cd5b48-f7d9-4fcf-b902-b5c69b6731d9 971 0 2024-02-09 18:31:15 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s  10.0.0.69  nfs-server-provisioner-0 eth0 nfs-server-provisioner [] []   [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff  [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.69-k8s-nfs--server--provisioner--0-"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.685 [INFO][2796] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.69-k8s-nfs--server--provisioner--0-eth0"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.707 [INFO][2811] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" HandleID="k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Workload="10.0.0.69-k8s-nfs--server--provisioner--0-eth0"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.722 [INFO][2811] ipam_plugin.go 268: Auto assigning IP ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" HandleID="k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Workload="10.0.0.69-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000cc430), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.69", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 18:31:15.70790555 +0000 UTC"}, Hostname:"10.0.0.69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.722 [INFO][2811] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.722 [INFO][2811] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.722 [INFO][2811] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.69'
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.724 [INFO][2811] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.728 [INFO][2811] ipam.go 372: Looking up existing affinities for host host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.731 [INFO][2811] ipam.go 489: Trying affinity for 192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.733 [INFO][2811] ipam.go 155: Attempting to load block cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.735 [INFO][2811] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.735 [INFO][2811] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.0/26 handle="k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.737 [INFO][2811] ipam.go 1682: Creating new handle: k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.739 [INFO][2811] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.0/26 handle="k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.744 [INFO][2811] ipam.go 1216: Successfully claimed IPs: [192.168.121.3/26] block=192.168.121.0/26 handle="k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.744 [INFO][2811] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.3/26] handle="k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" host="10.0.0.69"
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.744 [INFO][2811] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 18:31:15.761683 env[1137]: 2024-02-09 18:31:15.744 [INFO][2811] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.3/26] IPv6=[] ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" HandleID="k8s-pod-network.5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Workload="10.0.0.69-k8s-nfs--server--provisioner--0-eth0"
Feb  9 18:31:15.762338 env[1137]: 2024-02-09 18:31:15.746 [INFO][2796] k8s.go 385: Populated endpoint ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.69-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"34cd5b48-f7d9-4fcf-b902-b5c69b6731d9", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 31, 15, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.121.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:15.762338 env[1137]: 2024-02-09 18:31:15.746 [INFO][2796] k8s.go 386: Calico CNI using IPs: [192.168.121.3/32] ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.69-k8s-nfs--server--provisioner--0-eth0"
Feb  9 18:31:15.762338 env[1137]: 2024-02-09 18:31:15.746 [INFO][2796] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.69-k8s-nfs--server--provisioner--0-eth0"
Feb  9 18:31:15.762338 env[1137]: 2024-02-09 18:31:15.750 [INFO][2796] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.69-k8s-nfs--server--provisioner--0-eth0"
Feb  9 18:31:15.762502 env[1137]: 2024-02-09 18:31:15.750 [INFO][2796] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.69-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"34cd5b48-f7d9-4fcf-b902-b5c69b6731d9", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 31, 15, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.121.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:57:92:98:3c:2f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:15.762502 env[1137]: 2024-02-09 18:31:15.760 [INFO][2796] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.69-k8s-nfs--server--provisioner--0-eth0"
Feb  9 18:31:15.771000 audit[2837]: NETFILTER_CFG table=filter:85 family=2 entries=38 op=nft_register_chain pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:31:15.771000 audit[2837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19500 a0=3 a1=ffffd491ad20 a2=0 a3=ffffb1a04fa8 items=0 ppid=2307 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.771000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:31:15.792836 env[1137]: time="2024-02-09T18:31:15.792762182Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:31:15.792979 env[1137]: time="2024-02-09T18:31:15.792802747Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:31:15.792979 env[1137]: time="2024-02-09T18:31:15.792813668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:31:15.792979 env[1137]: time="2024-02-09T18:31:15.792945244Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c pid=2845 runtime=io.containerd.runc.v2
Feb  9 18:31:15.805494 systemd[1]: Started cri-containerd-5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c.scope.
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit: BPF prog-id=102 op=LOAD
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2845 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313664633765326639346663613263613134666431303737613635
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2845 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313664633765326639346663613263613134666431303737613635
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit: BPF prog-id=103 op=LOAD
Feb  9 18:31:15.829000 audit[2853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2845 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313664633765326639346663613263613134666431303737613635
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit: BPF prog-id=104 op=LOAD
Feb  9 18:31:15.829000 audit[2853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2845 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313664633765326639346663613263613134666431303737613635
Feb  9 18:31:15.829000 audit: BPF prog-id=104 op=UNLOAD
Feb  9 18:31:15.829000 audit: BPF prog-id=103 op=UNLOAD
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { perfmon } for  pid=2853 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit[2853]: AVC avc:  denied  { bpf } for  pid=2853 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:15.829000 audit: BPF prog-id=105 op=LOAD
Feb  9 18:31:15.829000 audit[2853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2845 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:15.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313664633765326639346663613263613134666431303737613635
Feb  9 18:31:15.831847 systemd-resolved[1089]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Feb  9 18:31:15.851816 env[1137]: time="2024-02-09T18:31:15.851734487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:34cd5b48-f7d9-4fcf-b902-b5c69b6731d9,Namespace:default,Attempt:0,} returns sandbox id \"5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c\""
Feb  9 18:31:15.854652 env[1137]: time="2024-02-09T18:31:15.854621645Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\""
Feb  9 18:31:16.591598 kubelet[1442]: E0209 18:31:16.591555    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:17.087408 systemd-networkd[1038]: cali60e51b789ff: Gained IPv6LL
Feb  9 18:31:17.592386 kubelet[1442]: E0209 18:31:17.592342    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:17.858062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount878114501.mount: Deactivated successfully.
Feb  9 18:31:18.593074 kubelet[1442]: E0209 18:31:18.593026    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:19.023558 update_engine[1126]: I0209 18:31:19.023434  1126 update_attempter.cc:509] Updating boot flags...
Feb  9 18:31:19.503435 env[1137]: time="2024-02-09T18:31:19.503325628Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:19.505208 env[1137]: time="2024-02-09T18:31:19.505169214Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:19.507223 env[1137]: time="2024-02-09T18:31:19.507195178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:19.508947 env[1137]: time="2024-02-09T18:31:19.508901350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:19.509762 env[1137]: time="2024-02-09T18:31:19.509731874Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\""
Feb  9 18:31:19.511845 env[1137]: time="2024-02-09T18:31:19.511802483Z" level=info msg="CreateContainer within sandbox \"5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}"
Feb  9 18:31:19.524023 env[1137]: time="2024-02-09T18:31:19.523982151Z" level=info msg="CreateContainer within sandbox \"5e16dc7e2f94fca2ca14fd1077a65f1f62c22abeabdfd17ba46d7b400d06a97c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"bfca492170122c5c12b547fd8f8c3f49ccfc5318a20a9a33580f6f4b0b53af60\""
Feb  9 18:31:19.524612 env[1137]: time="2024-02-09T18:31:19.524586732Z" level=info msg="StartContainer for \"bfca492170122c5c12b547fd8f8c3f49ccfc5318a20a9a33580f6f4b0b53af60\""
Feb  9 18:31:19.547929 systemd[1]: Started cri-containerd-bfca492170122c5c12b547fd8f8c3f49ccfc5318a20a9a33580f6f4b0b53af60.scope.
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.583000 audit: BPF prog-id=106 op=LOAD
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2845 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:19.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266636134393231373031323263356331326235343766643866386333
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2845 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:19.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266636134393231373031323263356331326235343766643866386333
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit: BPF prog-id=107 op=LOAD
Feb  9 18:31:19.584000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2845 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:19.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266636134393231373031323263356331326235343766643866386333
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit: BPF prog-id=108 op=LOAD
Feb  9 18:31:19.584000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2845 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:19.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266636134393231373031323263356331326235343766643866386333
Feb  9 18:31:19.584000 audit: BPF prog-id=108 op=UNLOAD
Feb  9 18:31:19.584000 audit: BPF prog-id=107 op=UNLOAD
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { perfmon } for  pid=2910 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit[2910]: AVC avc:  denied  { bpf } for  pid=2910 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:19.584000 audit: BPF prog-id=109 op=LOAD
Feb  9 18:31:19.584000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2845 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:19.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266636134393231373031323263356331326235343766643866386333
Feb  9 18:31:19.593283 kubelet[1442]: E0209 18:31:19.593251    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:19.619305 env[1137]: time="2024-02-09T18:31:19.619249638Z" level=info msg="StartContainer for \"bfca492170122c5c12b547fd8f8c3f49ccfc5318a20a9a33580f6f4b0b53af60\" returns successfully"
Feb  9 18:31:19.709000 audit[2938]: AVC avc:  denied  { search } for  pid=2938 comm="rpcbind" name="crypto" dev="proc" ino=17080 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Feb  9 18:31:19.709000 audit[2938]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff976bf000 a2=0 a3=0 items=0 ppid=2921 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 key=(null)
Feb  9 18:31:19.709000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77
Feb  9 18:31:19.758310 kubelet[1442]: I0209 18:31:19.758108    1442 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.1023467789999999 podCreationTimestamp="2024-02-09 18:31:15 +0000 UTC" firstStartedPulling="2024-02-09 18:31:15.854352611 +0000 UTC m=+36.019154616" lastFinishedPulling="2024-02-09 18:31:19.510079749 +0000 UTC m=+39.674881794" observedRunningTime="2024-02-09 18:31:19.757762366 +0000 UTC m=+39.922564371" watchObservedRunningTime="2024-02-09 18:31:19.758073957 +0000 UTC m=+39.922876002"
Feb  9 18:31:19.773000 audit[2944]: AVC avc:  denied  { search } for  pid=2944 comm="dbus-daemon" name="crypto" dev="proc" ino=17080 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Feb  9 18:31:19.773000 audit[2944]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa3b8f000 a2=0 a3=0 items=0 ppid=2921 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 key=(null)
Feb  9 18:31:19.773000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Feb  9 18:31:19.775000 audit[2945]: NETFILTER_CFG table=filter:86 family=2 entries=20 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:19.775000 audit[2945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe8779090 a2=0 a3=ffff8f01f6c0 items=0 ppid=1668 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:19.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:19.777000 audit[2945]: NETFILTER_CFG table=nat:87 family=2 entries=104 op=nft_register_chain pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:19.777000 audit[2945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffe8779090 a2=0 a3=ffff8f01f6c0 items=0 ppid=1668 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:19.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:19.784000 audit[2947]: AVC avc:  denied  { watch } for  pid=2947 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537947 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c476,c503 tclass=dir permissive=0
Feb  9 18:31:19.784000 audit[2947]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaae41dc550 a2=2c8 a3=aaaae41caa60 items=0 ppid=2921 pid=2947 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 key=(null)
Feb  9 18:31:19.784000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Feb  9 18:31:19.790000 audit[2948]: AVC avc:  denied  { read } for  pid=2948 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=17178 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0
Feb  9 18:31:19.790000 audit[2948]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffab1aa570 a2=80000 a3=0 items=0 ppid=2921 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 key=(null)
Feb  9 18:31:19.790000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Feb  9 18:31:19.791000 audit[2948]: AVC avc:  denied  { search } for  pid=2948 comm="ganesha.nfsd" name="crypto" dev="proc" ino=17080 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Feb  9 18:31:19.791000 audit[2948]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffaa53f000 a2=0 a3=0 items=0 ppid=2921 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c503 key=(null)
Feb  9 18:31:19.791000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Feb  9 18:31:20.517634 systemd[1]: run-containerd-runc-k8s.io-bfca492170122c5c12b547fd8f8c3f49ccfc5318a20a9a33580f6f4b0b53af60-runc.6IR1eB.mount: Deactivated successfully.
Feb  9 18:31:20.566830 kubelet[1442]: E0209 18:31:20.566773    1442 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:20.593970 kubelet[1442]: E0209 18:31:20.593927    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:21.594270 kubelet[1442]: E0209 18:31:21.594226    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:22.595043 kubelet[1442]: E0209 18:31:22.594998    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:23.595430 kubelet[1442]: E0209 18:31:23.595387    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:24.595897 kubelet[1442]: E0209 18:31:24.595853    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:25.596562 kubelet[1442]: E0209 18:31:25.596494    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:26.314881 kubelet[1442]: E0209 18:31:26.314850    1442 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Feb  9 18:31:26.596874 kubelet[1442]: E0209 18:31:26.596744    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:27.597691 kubelet[1442]: E0209 18:31:27.597653    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:28.598996 kubelet[1442]: E0209 18:31:28.598959    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:29.599939 kubelet[1442]: E0209 18:31:29.599905    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:29.771617 kubelet[1442]: I0209 18:31:29.771571    1442 topology_manager.go:215] "Topology Admit Handler" podUID="c3b4b8e8-03fc-476d-9a79-331e249a322a" podNamespace="default" podName="test-pod-1"
Feb  9 18:31:29.776154 systemd[1]: Created slice kubepods-besteffort-podc3b4b8e8_03fc_476d_9a79_331e249a322a.slice.
Feb  9 18:31:29.910701 kubelet[1442]: I0209 18:31:29.910582    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-5c5dbbed-2a77-47f2-84b3-642b9213eb35\" (UniqueName: \"kubernetes.io/nfs/c3b4b8e8-03fc-476d-9a79-331e249a322a-pvc-5c5dbbed-2a77-47f2-84b3-642b9213eb35\") pod \"test-pod-1\" (UID: \"c3b4b8e8-03fc-476d-9a79-331e249a322a\") " pod="default/test-pod-1"
Feb  9 18:31:29.910701 kubelet[1442]: I0209 18:31:29.910636    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wf94t\" (UniqueName: \"kubernetes.io/projected/c3b4b8e8-03fc-476d-9a79-331e249a322a-kube-api-access-wf94t\") pod \"test-pod-1\" (UID: \"c3b4b8e8-03fc-476d-9a79-331e249a322a\") " pod="default/test-pod-1"
Feb  9 18:31:30.026000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.029541 kernel: Failed to create system directory netfs
Feb  9 18:31:30.029592 kernel: kauditd_printk_skb: 140 callbacks suppressed
Feb  9 18:31:30.029609 kernel: audit: type=1400 audit(1707503490.026:796): avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.029661 kernel: Failed to create system directory netfs
Feb  9 18:31:30.026000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.031873 kernel: audit: type=1400 audit(1707503490.026:796): avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.026000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.034171 kernel: Failed to create system directory netfs
Feb  9 18:31:30.034211 kernel: audit: type=1400 audit(1707503490.026:796): avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.034229 kernel: Failed to create system directory netfs
Feb  9 18:31:30.034588 kernel: audit: type=1400 audit(1707503490.026:796): avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.026000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.026000 audit[2997]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaea67a5e0 a1=12c14 a2=aaaabb0ce028 a3=aaaaea66b010 items=0 ppid=573 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.041417 kernel: audit: type=1300 audit(1707503490.026:796): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaea67a5e0 a1=12c14 a2=aaaabb0ce028 a3=aaaaea66b010 items=0 ppid=573 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.041461 kernel: audit: type=1327 audit(1707503490.026:796): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 18:31:30.026000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.046336 kernel: Failed to create system directory fscache
Feb  9 18:31:30.046371 kernel: audit: type=1400 audit(1707503490.037:797): avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.046395 kernel: Failed to create system directory fscache
Feb  9 18:31:30.046410 kernel: audit: type=1400 audit(1707503490.037:797): avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.046749 kernel: Failed to create system directory fscache
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.050783 kernel: audit: type=1400 audit(1707503490.037:797): avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.050825 kernel: Failed to create system directory fscache
Feb  9 18:31:30.050845 kernel: audit: type=1400 audit(1707503490.037:797): avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.053037 kernel: Failed to create system directory fscache
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.053542 kernel: Failed to create system directory fscache
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.054656 kernel: Failed to create system directory fscache
Feb  9 18:31:30.054686 kernel: Failed to create system directory fscache
Feb  9 18:31:30.054708 kernel: Failed to create system directory fscache
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.055877 kernel: Failed to create system directory fscache
Feb  9 18:31:30.055900 kernel: Failed to create system directory fscache
Feb  9 18:31:30.055916 kernel: Failed to create system directory fscache
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.056684 kernel: Failed to create system directory fscache
Feb  9 18:31:30.056704 kernel: Failed to create system directory fscache
Feb  9 18:31:30.037000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.057575 kernel: FS-Cache: Loaded
Feb  9 18:31:30.037000 audit[2997]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaea88d210 a1=4c344 a2=aaaabb0ce028 a3=aaaaea66b010 items=0 ppid=573 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.037000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.076856 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.076888 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.076906 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.076921 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.076933 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.077646 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.077671 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.078847 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.078869 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.078890 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.079643 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.079674 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.080837 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.080859 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.080874 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.081635 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.081655 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.082891 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.082911 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.082927 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.083711 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.083727 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.084524 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.084549 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.085747 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.085767 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.085782 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.086549 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.086563 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.087797 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.087819 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.087838 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.088608 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.088627 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.089843 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.089870 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.089886 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.090661 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.090678 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.091910 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.091930 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.091944 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.092733 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.092748 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.093538 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.093558 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.094761 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.094781 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.094796 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.095573 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.095596 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.096814 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.096833 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.096850 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.097641 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.097657 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.098883 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.098908 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.098929 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.099697 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.099717 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.100926 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.100943 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.100961 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.101762 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.101786 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.102570 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.102588 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.103792 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.103808 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.103821 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.104608 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.104626 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.105834 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.105857 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.105873 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.106652 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.106679 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.107879 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.107901 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.107914 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.108696 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.108725 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.109936 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.109966 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.109984 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.110754 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.110778 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.111587 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.111603 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.112824 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.112840 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.112852 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.113646 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.113671 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.114870 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.114888 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.114905 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.115691 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.115706 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.116922 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.116948 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.116965 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.117740 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.117756 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.118557 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.118585 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.119784 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.119814 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.119828 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.120596 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.120612 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.121825 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.121852 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.121866 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.122645 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.122667 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.123883 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.123904 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.123917 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.124704 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.124724 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.125523 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.125544 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.068000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.126731 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.126757 kernel: Failed to create system directory sunrpc
Feb  9 18:31:30.131680 kernel: RPC: Registered named UNIX socket transport module.
Feb  9 18:31:30.131716 kernel: RPC: Registered udp transport module.
Feb  9 18:31:30.131743 kernel: RPC: Registered tcp transport module.
Feb  9 18:31:30.131757 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module.
Feb  9 18:31:30.068000 audit[2997]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaea8d9560 a1=fbb6c a2=aaaabb0ce028 a3=aaaaea66b010 items=6 ppid=573 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.068000 audit: CWD cwd="/"
Feb  9 18:31:30.068000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:31:30.068000 audit: PATH item=1 name=(null) inode=17310 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:31:30.068000 audit: PATH item=2 name=(null) inode=17310 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:31:30.068000 audit: PATH item=3 name=(null) inode=17311 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:31:30.068000 audit: PATH item=4 name=(null) inode=17310 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:31:30.068000 audit: PATH item=5 name=(null) inode=17312 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:31:30.068000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.151840 kernel: Failed to create system directory nfs
Feb  9 18:31:30.151876 kernel: Failed to create system directory nfs
Feb  9 18:31:30.151890 kernel: Failed to create system directory nfs
Feb  9 18:31:30.151903 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.152625 kernel: Failed to create system directory nfs
Feb  9 18:31:30.152657 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.153793 kernel: Failed to create system directory nfs
Feb  9 18:31:30.153815 kernel: Failed to create system directory nfs
Feb  9 18:31:30.153829 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.154559 kernel: Failed to create system directory nfs
Feb  9 18:31:30.154574 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.155718 kernel: Failed to create system directory nfs
Feb  9 18:31:30.155732 kernel: Failed to create system directory nfs
Feb  9 18:31:30.155745 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.156661 kernel: Failed to create system directory nfs
Feb  9 18:31:30.156723 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.157819 kernel: Failed to create system directory nfs
Feb  9 18:31:30.157841 kernel: Failed to create system directory nfs
Feb  9 18:31:30.157861 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.158592 kernel: Failed to create system directory nfs
Feb  9 18:31:30.158622 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.159740 kernel: Failed to create system directory nfs
Feb  9 18:31:30.159758 kernel: Failed to create system directory nfs
Feb  9 18:31:30.159771 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.160909 kernel: Failed to create system directory nfs
Feb  9 18:31:30.160929 kernel: Failed to create system directory nfs
Feb  9 18:31:30.160948 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.163750 kernel: Failed to create system directory nfs
Feb  9 18:31:30.163900 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.164960 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.166083 kernel: Failed to create system directory nfs
Feb  9 18:31:30.166175 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.166688 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.167584 kernel: Failed to create system directory nfs
Feb  9 18:31:30.167617 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.168809 kernel: Failed to create system directory nfs
Feb  9 18:31:30.168867 kernel: Failed to create system directory nfs
Feb  9 18:31:30.168885 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.169664 kernel: Failed to create system directory nfs
Feb  9 18:31:30.169684 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.170840 kernel: Failed to create system directory nfs
Feb  9 18:31:30.170856 kernel: Failed to create system directory nfs
Feb  9 18:31:30.170877 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.171626 kernel: Failed to create system directory nfs
Feb  9 18:31:30.171645 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.172786 kernel: Failed to create system directory nfs
Feb  9 18:31:30.172806 kernel: Failed to create system directory nfs
Feb  9 18:31:30.172819 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.173545 kernel: Failed to create system directory nfs
Feb  9 18:31:30.173560 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.174707 kernel: Failed to create system directory nfs
Feb  9 18:31:30.174723 kernel: Failed to create system directory nfs
Feb  9 18:31:30.174735 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.175871 kernel: Failed to create system directory nfs
Feb  9 18:31:30.175888 kernel: Failed to create system directory nfs
Feb  9 18:31:30.175900 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.176672 kernel: Failed to create system directory nfs
Feb  9 18:31:30.176687 kernel: Failed to create system directory nfs
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.145000 audit[2997]: AVC avc:  denied  { confidentiality } for  pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.177518 kernel: Failed to create system directory nfs
Feb  9 18:31:30.186565 kernel: FS-Cache: Netfs 'nfs' registered for caching
Feb  9 18:31:30.145000 audit[2997]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaeaa05b40 a1=ae35c a2=aaaabb0ce028 a3=aaaaea66b010 items=0 ppid=573 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.145000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.213605 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.213656 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.213673 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.213686 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.214842 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.214860 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.214882 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.215699 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.216918 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.216932 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.216945 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.216963 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.217786 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.218621 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.218676 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.218698 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.219905 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.219924 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.219938 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.220750 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.221561 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.221582 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.221596 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.222791 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.222806 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.222820 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.223604 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.223624 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.224816 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.224837 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.225634 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.225656 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.226844 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.226859 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.226872 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.226885 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.227668 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.228523 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.228543 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.228557 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.229822 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.229845 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.229858 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.230683 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.230698 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.231961 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.231980 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.231998 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.232898 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.233828 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.233843 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.233855 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.234758 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.234778 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.235558 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.236782 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.236797 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.236816 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.236829 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.237584 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.237599 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.238819 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.238854 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.238869 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.239717 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.239736 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.240519 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.240533 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.241715 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.241738 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.241751 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.242956 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.242971 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.242984 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.243790 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.244576 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.244592 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.244610 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.245817 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.245833 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.245845 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.246719 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.246734 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.247549 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.248853 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.248876 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.248896 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.248909 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.249746 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.250622 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.250646 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.250662 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.204000 audit[3002]: AVC avc:  denied  { confidentiality } for  pid=3002 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.251881 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.251897 kernel: Failed to create system directory nfs4
Feb  9 18:31:30.358547 kernel: NFS: Registering the id_resolver key type
Feb  9 18:31:30.358956 kernel: Key type id_resolver registered
Feb  9 18:31:30.359001 kernel: Key type id_legacy registered
Feb  9 18:31:30.204000 audit[3002]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8918b010 a1=167c04 a2=aaaadba4e028 a3=aaaae4f00010 items=0 ppid=573 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.204000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.366683 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.366721 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.367595 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.367615 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.368534 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.368556 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.369932 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.369951 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.369963 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.370848 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.370863 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.370876 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.371687 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.371704 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.372519 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.372538 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.373764 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.373781 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.373794 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.374588 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.374603 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.375835 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.375855 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.375868 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.376685 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.376705 kernel: Failed to create system directory rpcgss
Feb  9 18:31:30.362000 audit[3003]: AVC avc:  denied  { confidentiality } for  pid=3003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 18:31:30.362000 audit[3003]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff92ec3010 a1=3e09c a2=aaaabf07e028 a3=aaaae52bb010 items=0 ppid=573 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.362000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36
Feb  9 18:31:30.390245 nfsidmap[3015]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain'
Feb  9 18:31:30.393003 nfsidmap[3018]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain'
Feb  9 18:31:30.408000 audit[1198]: AVC avc:  denied  { watch_reads } for  pid=1198 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 18:31:30.408000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 18:31:30.408000 audit[1198]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad0b6fab0 a2=10 a3=0 items=0 ppid=1 pid=1198 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.408000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Feb  9 18:31:30.408000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 18:31:30.408000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 18:31:30.408000 audit[1198]: AVC avc:  denied  { watch_reads } for  pid=1198 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 18:31:30.408000 audit[1198]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad0b6fab0 a2=10 a3=0 items=0 ppid=1 pid=1198 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.408000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Feb  9 18:31:30.408000 audit[1198]: AVC avc:  denied  { watch_reads } for  pid=1198 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 18:31:30.408000 audit[1198]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad0b6fab0 a2=10 a3=0 items=0 ppid=1 pid=1198 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.408000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Feb  9 18:31:30.601427 kubelet[1442]: E0209 18:31:30.601356    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:30.678979 env[1137]: time="2024-02-09T18:31:30.678930827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c3b4b8e8-03fc-476d-9a79-331e249a322a,Namespace:default,Attempt:0,}"
Feb  9 18:31:30.758000 audit[3044]: NETFILTER_CFG table=filter:88 family=2 entries=9 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:30.758000 audit[3044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc27a5da0 a2=0 a3=ffff9b9636c0 items=0 ppid=1668 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:30.764055 kubelet[1442]: I0209 18:31:30.763982    1442 topology_manager.go:215] "Topology Admit Handler" podUID="da29a340-0cd7-4846-8ba0-f34d95d8b3a6" podNamespace="calico-apiserver" podName="calico-apiserver-7cf6b8989-v8fdb"
Feb  9 18:31:30.759000 audit[3044]: NETFILTER_CFG table=nat:89 family=2 entries=44 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:30.759000 audit[3044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffc27a5da0 a2=0 a3=ffff9b9636c0 items=0 ppid=1668 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.759000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:30.769132 systemd[1]: Created slice kubepods-besteffort-podda29a340_0cd7_4846_8ba0_f34d95d8b3a6.slice.
Feb  9 18:31:30.783000 audit[3046]: NETFILTER_CFG table=filter:90 family=2 entries=10 op=nft_register_rule pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:30.783000 audit[3046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffffe0893f0 a2=0 a3=ffffbe11d6c0 items=0 ppid=1668 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:30.784000 audit[3046]: NETFILTER_CFG table=nat:91 family=2 entries=44 op=nft_register_rule pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:30.784000 audit[3046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=fffffe0893f0 a2=0 a3=ffffbe11d6c0 items=0 ppid=1668 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:30.803172 systemd-networkd[1038]: cali5ec59c6bf6e: Link UP
Feb  9 18:31:30.804718 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 18:31:30.804753 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready
Feb  9 18:31:30.804492 systemd-networkd[1038]: cali5ec59c6bf6e: Gained carrier
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.720 [INFO][3022] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.69-k8s-test--pod--1-eth0  default  c3b4b8e8-03fc-476d-9a79-331e249a322a 1034 0 2024-02-09 18:31:15 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.0.0.69  test-pod-1 eth0 default [] []   [kns.default ksa.default.default] cali5ec59c6bf6e  [] []}} ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.69-k8s-test--pod--1-"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.720 [INFO][3022] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.69-k8s-test--pod--1-eth0"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.744 [INFO][3035] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" HandleID="k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Workload="10.0.0.69-k8s-test--pod--1-eth0"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.761 [INFO][3035] ipam_plugin.go 268: Auto assigning IP ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" HandleID="k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Workload="10.0.0.69-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000247aa0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.69", "pod":"test-pod-1", "timestamp":"2024-02-09 18:31:30.744049204 +0000 UTC"}, Hostname:"10.0.0.69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.761 [INFO][3035] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.761 [INFO][3035] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.761 [INFO][3035] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.69'
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.764 [INFO][3035] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.770 [INFO][3035] ipam.go 372: Looking up existing affinities for host host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.779 [INFO][3035] ipam.go 489: Trying affinity for 192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.782 [INFO][3035] ipam.go 155: Attempting to load block cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.784 [INFO][3035] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.784 [INFO][3035] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.0/26 handle="k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.786 [INFO][3035] ipam.go 1682: Creating new handle: k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.793 [INFO][3035] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.0/26 handle="k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.798 [INFO][3035] ipam.go 1216: Successfully claimed IPs: [192.168.121.4/26] block=192.168.121.0/26 handle="k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.798 [INFO][3035] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.4/26] handle="k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" host="10.0.0.69"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.798 [INFO][3035] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.798 [INFO][3035] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.4/26] IPv6=[] ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" HandleID="k8s-pod-network.317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Workload="10.0.0.69-k8s-test--pod--1-eth0"
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.800 [INFO][3022] k8s.go 385: Populated endpoint ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.69-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c3b4b8e8-03fc-476d-9a79-331e249a322a", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 31, 15, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:30.814708 env[1137]: 2024-02-09 18:31:30.800 [INFO][3022] k8s.go 386: Calico CNI using IPs: [192.168.121.4/32] ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.69-k8s-test--pod--1-eth0"
Feb  9 18:31:30.815311 env[1137]: 2024-02-09 18:31:30.800 [INFO][3022] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.69-k8s-test--pod--1-eth0"
Feb  9 18:31:30.815311 env[1137]: 2024-02-09 18:31:30.805 [INFO][3022] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.69-k8s-test--pod--1-eth0"
Feb  9 18:31:30.815311 env[1137]: 2024-02-09 18:31:30.805 [INFO][3022] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.69-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c3b4b8e8-03fc-476d-9a79-331e249a322a", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 31, 15, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1e:de:6b:d6:00:5f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:30.815311 env[1137]: 2024-02-09 18:31:30.809 [INFO][3022] k8s.go 491: Wrote updated endpoint to datastore ContainerID="317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.69-k8s-test--pod--1-eth0"
Feb  9 18:31:30.821000 audit[3061]: NETFILTER_CFG table=filter:92 family=2 entries=44 op=nft_register_chain pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:31:30.821000 audit[3061]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21932 a0=3 a1=ffffc1f35630 a2=0 a3=ffffbedd4fa8 items=0 ppid=2307 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.821000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:31:30.826097 env[1137]: time="2024-02-09T18:31:30.826029692Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:31:30.826192 env[1137]: time="2024-02-09T18:31:30.826105137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:31:30.826192 env[1137]: time="2024-02-09T18:31:30.826131739Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:31:30.826317 env[1137]: time="2024-02-09T18:31:30.826289748Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803 pid=3068 runtime=io.containerd.runc.v2
Feb  9 18:31:30.837018 systemd[1]: Started cri-containerd-317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803.scope.
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.854000 audit: BPF prog-id=110 op=LOAD
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3068 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373130306332633932643838363362626433333463316136383835
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3068 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373130306332633932643838363362626433333463316136383835
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit: BPF prog-id=111 op=LOAD
Feb  9 18:31:30.855000 audit[3079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3068 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373130306332633932643838363362626433333463316136383835
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit: BPF prog-id=112 op=LOAD
Feb  9 18:31:30.855000 audit[3079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3068 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373130306332633932643838363362626433333463316136383835
Feb  9 18:31:30.855000 audit: BPF prog-id=112 op=UNLOAD
Feb  9 18:31:30.855000 audit: BPF prog-id=111 op=UNLOAD
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:30.855000 audit: BPF prog-id=113 op=LOAD
Feb  9 18:31:30.855000 audit[3079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3068 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:30.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373130306332633932643838363362626433333463316136383835
Feb  9 18:31:30.858679 systemd-resolved[1089]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Feb  9 18:31:30.874899 env[1137]: time="2024-02-09T18:31:30.874857195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c3b4b8e8-03fc-476d-9a79-331e249a322a,Namespace:default,Attempt:0,} returns sandbox id \"317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803\""
Feb  9 18:31:30.876308 env[1137]: time="2024-02-09T18:31:30.876279842Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Feb  9 18:31:30.918186 kubelet[1442]: I0209 18:31:30.918108    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/da29a340-0cd7-4846-8ba0-f34d95d8b3a6-calico-apiserver-certs\") pod \"calico-apiserver-7cf6b8989-v8fdb\" (UID: \"da29a340-0cd7-4846-8ba0-f34d95d8b3a6\") " pod="calico-apiserver/calico-apiserver-7cf6b8989-v8fdb"
Feb  9 18:31:30.918186 kubelet[1442]: I0209 18:31:30.918158    1442 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fkncs\" (UniqueName: \"kubernetes.io/projected/da29a340-0cd7-4846-8ba0-f34d95d8b3a6-kube-api-access-fkncs\") pod \"calico-apiserver-7cf6b8989-v8fdb\" (UID: \"da29a340-0cd7-4846-8ba0-f34d95d8b3a6\") " pod="calico-apiserver/calico-apiserver-7cf6b8989-v8fdb"
Feb  9 18:31:31.018701 kubelet[1442]: E0209 18:31:31.018659    1442 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found
Feb  9 18:31:31.018828 kubelet[1442]: E0209 18:31:31.018762    1442 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/da29a340-0cd7-4846-8ba0-f34d95d8b3a6-calico-apiserver-certs podName:da29a340-0cd7-4846-8ba0-f34d95d8b3a6 nodeName:}" failed. No retries permitted until 2024-02-09 18:31:31.518729479 +0000 UTC m=+51.683531524 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/da29a340-0cd7-4846-8ba0-f34d95d8b3a6-calico-apiserver-certs") pod "calico-apiserver-7cf6b8989-v8fdb" (UID: "da29a340-0cd7-4846-8ba0-f34d95d8b3a6") : secret "calico-apiserver-certs" not found
Feb  9 18:31:31.163844 env[1137]: time="2024-02-09T18:31:31.163734588Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:31.165306 env[1137]: time="2024-02-09T18:31:31.165274958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:31.166870 env[1137]: time="2024-02-09T18:31:31.166841930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:31.168494 env[1137]: time="2024-02-09T18:31:31.168455865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:31.169093 env[1137]: time="2024-02-09T18:31:31.169064421Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\""
Feb  9 18:31:31.171176 env[1137]: time="2024-02-09T18:31:31.171143423Z" level=info msg="CreateContainer within sandbox \"317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803\" for container &ContainerMetadata{Name:test,Attempt:0,}"
Feb  9 18:31:31.181835 env[1137]: time="2024-02-09T18:31:31.181789687Z" level=info msg="CreateContainer within sandbox \"317100c2c92d8863bbd334c1a6885f1960103c21a1c02e2f26f9bfe00a7a2803\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9d023d8708294cd67cf620d1b36940c4bbd60920b80567558fc28667e60597b8\""
Feb  9 18:31:31.182622 env[1137]: time="2024-02-09T18:31:31.182555852Z" level=info msg="StartContainer for \"9d023d8708294cd67cf620d1b36940c4bbd60920b80567558fc28667e60597b8\""
Feb  9 18:31:31.202338 systemd[1]: Started cri-containerd-9d023d8708294cd67cf620d1b36940c4bbd60920b80567558fc28667e60597b8.scope.
Feb  9 18:31:31.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit: BPF prog-id=114 op=LOAD
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3068 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303233643837303832393463643637636636323064316233363934
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3068 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303233643837303832393463643637636636323064316233363934
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit: BPF prog-id=115 op=LOAD
Feb  9 18:31:31.235000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3068 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303233643837303832393463643637636636323064316233363934
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit: BPF prog-id=116 op=LOAD
Feb  9 18:31:31.235000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3068 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303233643837303832393463643637636636323064316233363934
Feb  9 18:31:31.235000 audit: BPF prog-id=116 op=UNLOAD
Feb  9 18:31:31.235000 audit: BPF prog-id=115 op=UNLOAD
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.235000 audit: BPF prog-id=117 op=LOAD
Feb  9 18:31:31.235000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3068 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303233643837303832393463643637636636323064316233363934
Feb  9 18:31:31.249444 env[1137]: time="2024-02-09T18:31:31.249404055Z" level=info msg="StartContainer for \"9d023d8708294cd67cf620d1b36940c4bbd60920b80567558fc28667e60597b8\" returns successfully"
Feb  9 18:31:31.602043 kubelet[1442]: E0209 18:31:31.601990    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:31.672476 env[1137]: time="2024-02-09T18:31:31.672431520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cf6b8989-v8fdb,Uid:da29a340-0cd7-4846-8ba0-f34d95d8b3a6,Namespace:calico-apiserver,Attempt:0,}"
Feb  9 18:31:31.786058 systemd-networkd[1038]: calib2012f2be4b: Link UP
Feb  9 18:31:31.787388 systemd-networkd[1038]: calib2012f2be4b: Gained carrier
Feb  9 18:31:31.787525 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib2012f2be4b: link becomes ready
Feb  9 18:31:31.793917 kubelet[1442]: I0209 18:31:31.793876    1442 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.50047279 podCreationTimestamp="2024-02-09 18:31:15 +0000 UTC" firstStartedPulling="2024-02-09 18:31:30.875977783 +0000 UTC m=+51.040779828" lastFinishedPulling="2024-02-09 18:31:31.169339957 +0000 UTC m=+51.334142002" observedRunningTime="2024-02-09 18:31:31.781424715 +0000 UTC m=+51.946226760" watchObservedRunningTime="2024-02-09 18:31:31.793834964 +0000 UTC m=+51.958637009"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.723 [INFO][3160] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0 calico-apiserver-7cf6b8989- calico-apiserver  da29a340-0cd7-4846-8ba0-f34d95d8b3a6 1077 0 2024-02-09 18:31:30 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7cf6b8989 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s  10.0.0.69  calico-apiserver-7cf6b8989-v8fdb eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib2012f2be4b  [] []}} ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Namespace="calico-apiserver" Pod="calico-apiserver-7cf6b8989-v8fdb" WorkloadEndpoint="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.723 [INFO][3160] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Namespace="calico-apiserver" Pod="calico-apiserver-7cf6b8989-v8fdb" WorkloadEndpoint="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.745 [INFO][3174] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" HandleID="k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Workload="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.758 [INFO][3174] ipam_plugin.go 268: Auto assigning IP ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" HandleID="k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Workload="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000cda70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.69", "pod":"calico-apiserver-7cf6b8989-v8fdb", "timestamp":"2024-02-09 18:31:31.745961154 +0000 UTC"}, Hostname:"10.0.0.69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.758 [INFO][3174] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.758 [INFO][3174] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.758 [INFO][3174] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.69'
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.759 [INFO][3174] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.763 [INFO][3174] ipam.go 372: Looking up existing affinities for host host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.767 [INFO][3174] ipam.go 489: Trying affinity for 192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.768 [INFO][3174] ipam.go 155: Attempting to load block cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.770 [INFO][3174] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.0/26 host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.770 [INFO][3174] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.0/26 handle="k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.772 [INFO][3174] ipam.go 1682: Creating new handle: k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.777 [INFO][3174] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.0/26 handle="k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.783 [INFO][3174] ipam.go 1216: Successfully claimed IPs: [192.168.121.5/26] block=192.168.121.0/26 handle="k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.783 [INFO][3174] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.5/26] handle="k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" host="10.0.0.69"
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.783 [INFO][3174] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 18:31:31.796622 env[1137]: 2024-02-09 18:31:31.783 [INFO][3174] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.5/26] IPv6=[] ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" HandleID="k8s-pod-network.154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Workload="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0"
Feb  9 18:31:31.797298 env[1137]: 2024-02-09 18:31:31.784 [INFO][3160] k8s.go 385: Populated endpoint ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Namespace="calico-apiserver" Pod="calico-apiserver-7cf6b8989-v8fdb" WorkloadEndpoint="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0", GenerateName:"calico-apiserver-7cf6b8989-", Namespace:"calico-apiserver", SelfLink:"", UID:"da29a340-0cd7-4846-8ba0-f34d95d8b3a6", ResourceVersion:"1077", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 31, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cf6b8989", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"", Pod:"calico-apiserver-7cf6b8989-v8fdb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.121.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib2012f2be4b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:31.797298 env[1137]: 2024-02-09 18:31:31.784 [INFO][3160] k8s.go 386: Calico CNI using IPs: [192.168.121.5/32] ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Namespace="calico-apiserver" Pod="calico-apiserver-7cf6b8989-v8fdb" WorkloadEndpoint="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0"
Feb  9 18:31:31.797298 env[1137]: 2024-02-09 18:31:31.784 [INFO][3160] dataplane_linux.go 68: Setting the host side veth name to calib2012f2be4b ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Namespace="calico-apiserver" Pod="calico-apiserver-7cf6b8989-v8fdb" WorkloadEndpoint="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0"
Feb  9 18:31:31.797298 env[1137]: 2024-02-09 18:31:31.787 [INFO][3160] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Namespace="calico-apiserver" Pod="calico-apiserver-7cf6b8989-v8fdb" WorkloadEndpoint="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0"
Feb  9 18:31:31.797298 env[1137]: 2024-02-09 18:31:31.787 [INFO][3160] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Namespace="calico-apiserver" Pod="calico-apiserver-7cf6b8989-v8fdb" WorkloadEndpoint="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0", GenerateName:"calico-apiserver-7cf6b8989-", Namespace:"calico-apiserver", SelfLink:"", UID:"da29a340-0cd7-4846-8ba0-f34d95d8b3a6", ResourceVersion:"1077", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 31, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cf6b8989", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.69", ContainerID:"154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1", Pod:"calico-apiserver-7cf6b8989-v8fdb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.121.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib2012f2be4b", MAC:"f6:74:b2:cc:92:f3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 18:31:31.797298 env[1137]: 2024-02-09 18:31:31.793 [INFO][3160] k8s.go 491: Wrote updated endpoint to datastore ContainerID="154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1" Namespace="calico-apiserver" Pod="calico-apiserver-7cf6b8989-v8fdb" WorkloadEndpoint="10.0.0.69-k8s-calico--apiserver--7cf6b8989--v8fdb-eth0"
Feb  9 18:31:31.808256 env[1137]: time="2024-02-09T18:31:31.808181486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:31:31.808373 env[1137]: time="2024-02-09T18:31:31.808266251Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:31:31.808373 env[1137]: time="2024-02-09T18:31:31.808294012Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:31:31.808503 env[1137]: time="2024-02-09T18:31:31.808467062Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1 pid=3204 runtime=io.containerd.runc.v2
Feb  9 18:31:31.818841 systemd[1]: Started cri-containerd-154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1.scope.
Feb  9 18:31:31.815000 audit[3220]: NETFILTER_CFG table=filter:93 family=2 entries=55 op=nft_register_chain pid=3220 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 18:31:31.815000 audit[3220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28088 a0=3 a1=ffffe3c52240 a2=0 a3=ffffb9d00fa8 items=0 ppid=2307 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.815000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.856000 audit: BPF prog-id=118 op=LOAD
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3204 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346566613963306239386135626463363935336233343132663436
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3204 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346566613963306239386135626463363935336233343132663436
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.858000 audit: BPF prog-id=119 op=LOAD
Feb  9 18:31:31.858000 audit[3214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3204 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346566613963306239386135626463363935336233343132663436
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.859000 audit: BPF prog-id=120 op=LOAD
Feb  9 18:31:31.859000 audit[3214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3204 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346566613963306239386135626463363935336233343132663436
Feb  9 18:31:31.860000 audit: BPF prog-id=120 op=UNLOAD
Feb  9 18:31:31.860000 audit: BPF prog-id=119 op=UNLOAD
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { perfmon } for  pid=3214 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit[3214]: AVC avc:  denied  { bpf } for  pid=3214 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:31.860000 audit: BPF prog-id=121 op=LOAD
Feb  9 18:31:31.860000 audit[3214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3204 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:31.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346566613963306239386135626463363935336233343132663436
Feb  9 18:31:31.861972 systemd-resolved[1089]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Feb  9 18:31:31.878697 env[1137]: time="2024-02-09T18:31:31.878650701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cf6b8989-v8fdb,Uid:da29a340-0cd7-4846-8ba0-f34d95d8b3a6,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1\""
Feb  9 18:31:31.880244 env[1137]: time="2024-02-09T18:31:31.880216113Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\""
Feb  9 18:31:32.058734 systemd-networkd[1038]: cali5ec59c6bf6e: Gained IPv6LL
Feb  9 18:31:32.602394 kubelet[1442]: E0209 18:31:32.602348    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:32.954664 systemd-networkd[1038]: calib2012f2be4b: Gained IPv6LL
Feb  9 18:31:33.080350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1700165585.mount: Deactivated successfully.
Feb  9 18:31:33.603069 kubelet[1442]: E0209 18:31:33.603022    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:34.253172 env[1137]: time="2024-02-09T18:31:34.253125903Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:34.254434 env[1137]: time="2024-02-09T18:31:34.254397809Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:34.256772 env[1137]: time="2024-02-09T18:31:34.256733652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:34.257724 env[1137]: time="2024-02-09T18:31:34.257695542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:31:34.258314 env[1137]: time="2024-02-09T18:31:34.258259891Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\""
Feb  9 18:31:34.260275 env[1137]: time="2024-02-09T18:31:34.260247836Z" level=info msg="CreateContainer within sandbox \"154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}"
Feb  9 18:31:34.269317 env[1137]: time="2024-02-09T18:31:34.269277948Z" level=info msg="CreateContainer within sandbox \"154efa9c0b98a5bdc6953b3412f4651305210d7ff2baf9a2a0f77de387caa5b1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"544dfc31f5c2b365cc0a997c029537eebd81464bae6c224f79399f3a47d7f4da\""
Feb  9 18:31:34.270088 env[1137]: time="2024-02-09T18:31:34.270047948Z" level=info msg="StartContainer for \"544dfc31f5c2b365cc0a997c029537eebd81464bae6c224f79399f3a47d7f4da\""
Feb  9 18:31:34.289854 systemd[1]: Started cri-containerd-544dfc31f5c2b365cc0a997c029537eebd81464bae6c224f79399f3a47d7f4da.scope.
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit: BPF prog-id=122 op=LOAD
Feb  9 18:31:34.314000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.314000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3204 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346466633331663563326233363563633061393937633032393533
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3204 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346466633331663563326233363563633061393937633032393533
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit: BPF prog-id=123 op=LOAD
Feb  9 18:31:34.315000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3204 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346466633331663563326233363563633061393937633032393533
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.315000 audit: BPF prog-id=124 op=LOAD
Feb  9 18:31:34.315000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3204 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346466633331663563326233363563633061393937633032393533
Feb  9 18:31:34.316000 audit: BPF prog-id=124 op=UNLOAD
Feb  9 18:31:34.316000 audit: BPF prog-id=123 op=UNLOAD
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { perfmon } for  pid=3248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit[3248]: AVC avc:  denied  { bpf } for  pid=3248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:31:34.316000 audit: BPF prog-id=125 op=LOAD
Feb  9 18:31:34.316000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3204 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346466633331663563326233363563633061393937633032393533
Feb  9 18:31:34.339919 env[1137]: time="2024-02-09T18:31:34.339873883Z" level=info msg="StartContainer for \"544dfc31f5c2b365cc0a997c029537eebd81464bae6c224f79399f3a47d7f4da\" returns successfully"
Feb  9 18:31:34.604091 kubelet[1442]: E0209 18:31:34.604052    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:34.791149 kubelet[1442]: I0209 18:31:34.791110    1442 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7cf6b8989-v8fdb" podStartSLOduration=2.41218239 podCreationTimestamp="2024-02-09 18:31:30 +0000 UTC" firstStartedPulling="2024-02-09 18:31:31.879800488 +0000 UTC m=+52.044602493" lastFinishedPulling="2024-02-09 18:31:34.258684234 +0000 UTC m=+54.423486279" observedRunningTime="2024-02-09 18:31:34.789705585 +0000 UTC m=+54.954507630" watchObservedRunningTime="2024-02-09 18:31:34.791066176 +0000 UTC m=+54.955868221"
Feb  9 18:31:34.805000 audit[3280]: NETFILTER_CFG table=filter:94 family=2 entries=10 op=nft_register_rule pid=3280 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:34.805000 audit[3280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe200d710 a2=0 a3=ffffb786b6c0 items=0 ppid=1668 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:34.806000 audit[3280]: NETFILTER_CFG table=nat:95 family=2 entries=44 op=nft_register_rule pid=3280 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:34.806000 audit[3280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffe200d710 a2=0 a3=ffffb786b6c0 items=0 ppid=1668 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:34.905000 audit[3259]: AVC avc:  denied  { watch } for  pid=3259 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_31_31.199662214/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c986 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c21,c986 tclass=file permissive=0
Feb  9 18:31:34.905000 audit[3259]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000572660 a2=fc6 a3=0 items=0 ppid=3204 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c986 key=(null)
Feb  9 18:31:34.905000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C
Feb  9 18:31:34.915000 audit[3283]: NETFILTER_CFG table=filter:96 family=2 entries=10 op=nft_register_rule pid=3283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:34.915000 audit[3283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff141d950 a2=0 a3=ffff9943a6c0 items=0 ppid=1668 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.915000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:34.917000 audit[3283]: NETFILTER_CFG table=nat:97 family=2 entries=44 op=nft_register_rule pid=3283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 18:31:34.917000 audit[3283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=fffff141d950 a2=0 a3=ffff9943a6c0 items=0 ppid=1668 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:31:34.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 18:31:35.604385 kubelet[1442]: E0209 18:31:35.604334    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:36.604591 kubelet[1442]: E0209 18:31:36.604537    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 18:31:37.605131 kubelet[1442]: E0209 18:31:37.605076    1442 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"