Feb 12 19:30:21.726574 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:30:21.726594 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:30:21.726602 kernel: efi: EFI v2.70 by EDK II Feb 12 19:30:21.726608 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Feb 12 19:30:21.726613 kernel: random: crng init done Feb 12 19:30:21.726618 kernel: ACPI: Early table checksum verification disabled Feb 12 19:30:21.726624 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Feb 12 19:30:21.726631 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Feb 12 19:30:21.726637 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726642 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726648 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726653 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726659 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726664 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726672 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726678 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726684 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:30:21.726690 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Feb 12 19:30:21.726696 kernel: NUMA: Failed to initialise from firmware Feb 12 19:30:21.726701 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:30:21.726708 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Feb 12 19:30:21.726713 kernel: Zone ranges: Feb 12 19:30:21.726719 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:30:21.726726 kernel: DMA32 empty Feb 12 19:30:21.726732 kernel: Normal empty Feb 12 19:30:21.726738 kernel: Movable zone start for each node Feb 12 19:30:21.726743 kernel: Early memory node ranges Feb 12 19:30:21.726749 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Feb 12 19:30:21.726755 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Feb 12 19:30:21.726761 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Feb 12 19:30:21.726767 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Feb 12 19:30:21.726772 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Feb 12 19:30:21.726778 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Feb 12 19:30:21.726784 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Feb 12 19:30:21.726790 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:30:21.726797 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Feb 12 19:30:21.726802 kernel: psci: probing for conduit method from ACPI. Feb 12 19:30:21.726808 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:30:21.726814 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:30:21.726820 kernel: psci: Trusted OS migration not required Feb 12 19:30:21.726828 kernel: psci: SMC Calling Convention v1.1 Feb 12 19:30:21.726834 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Feb 12 19:30:21.726842 kernel: ACPI: SRAT not present Feb 12 19:30:21.726848 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:30:21.726854 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:30:21.726861 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Feb 12 19:30:21.726876 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:30:21.726882 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:30:21.726889 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:30:21.726895 kernel: CPU features: detected: Spectre-v4 Feb 12 19:30:21.726901 kernel: CPU features: detected: Spectre-BHB Feb 12 19:30:21.726909 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:30:21.726915 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:30:21.726921 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:30:21.726927 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Feb 12 19:30:21.726933 kernel: Policy zone: DMA Feb 12 19:30:21.726941 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:30:21.726948 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:30:21.726954 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:30:21.726960 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:30:21.726966 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:30:21.726972 kernel: Memory: 2459152K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113136K reserved, 0K cma-reserved) Feb 12 19:30:21.726980 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 19:30:21.726986 kernel: trace event string verifier disabled Feb 12 19:30:21.726992 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:30:21.726999 kernel: rcu: RCU event tracing is enabled. Feb 12 19:30:21.727005 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 19:30:21.727012 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:30:21.727018 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:30:21.727024 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:30:21.727030 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 19:30:21.727036 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:30:21.727043 kernel: GICv3: 256 SPIs implemented Feb 12 19:30:21.727050 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:30:21.727056 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:30:21.727063 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:30:21.727069 kernel: GICv3: 16 PPIs implemented Feb 12 19:30:21.727075 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Feb 12 19:30:21.727081 kernel: ACPI: SRAT not present Feb 12 19:30:21.727087 kernel: ITS [mem 0x08080000-0x0809ffff] Feb 12 19:30:21.727093 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Feb 12 19:30:21.727100 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Feb 12 19:30:21.727106 kernel: GICv3: using LPI property table @0x00000000400d0000 Feb 12 19:30:21.727112 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Feb 12 19:30:21.727118 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:30:21.727126 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:30:21.727132 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:30:21.727138 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:30:21.727144 kernel: arm-pv: using stolen time PV Feb 12 19:30:21.727151 kernel: Console: colour dummy device 80x25 Feb 12 19:30:21.727157 kernel: ACPI: Core revision 20210730 Feb 12 19:30:21.727164 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:30:21.727170 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:30:21.727176 kernel: LSM: Security Framework initializing Feb 12 19:30:21.727182 kernel: SELinux: Initializing. Feb 12 19:30:21.727190 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:30:21.727197 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:30:21.727203 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:30:21.727209 kernel: Platform MSI: ITS@0x8080000 domain created Feb 12 19:30:21.727215 kernel: PCI/MSI: ITS@0x8080000 domain created Feb 12 19:30:21.727222 kernel: Remapping and enabling EFI services. Feb 12 19:30:21.727228 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:30:21.727234 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:30:21.727241 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Feb 12 19:30:21.727248 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Feb 12 19:30:21.727255 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:30:21.727261 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:30:21.727267 kernel: Detected PIPT I-cache on CPU2 Feb 12 19:30:21.727274 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Feb 12 19:30:21.727280 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Feb 12 19:30:21.727287 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:30:21.727293 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Feb 12 19:30:21.727299 kernel: Detected PIPT I-cache on CPU3 Feb 12 19:30:21.727305 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Feb 12 19:30:21.727313 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Feb 12 19:30:21.727319 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:30:21.727326 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Feb 12 19:30:21.727332 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 19:30:21.727342 kernel: SMP: Total of 4 processors activated. Feb 12 19:30:21.727350 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:30:21.727357 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:30:21.727364 kernel: CPU features: detected: Common not Private translations Feb 12 19:30:21.727371 kernel: CPU features: detected: CRC32 instructions Feb 12 19:30:21.727377 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:30:21.727384 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:30:21.727390 kernel: CPU features: detected: Privileged Access Never Feb 12 19:30:21.727398 kernel: CPU features: detected: RAS Extension Support Feb 12 19:30:21.727405 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Feb 12 19:30:21.727411 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:30:21.727418 kernel: alternatives: patching kernel code Feb 12 19:30:21.727425 kernel: devtmpfs: initialized Feb 12 19:30:21.727432 kernel: KASLR enabled Feb 12 19:30:21.727439 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:30:21.727445 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 19:30:21.727452 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:30:21.727459 kernel: SMBIOS 3.0.0 present. Feb 12 19:30:21.727466 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Feb 12 19:30:21.727473 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:30:21.727487 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:30:21.727495 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:30:21.727505 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:30:21.727511 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:30:21.727518 kernel: audit: type=2000 audit(0.041:1): state=initialized audit_enabled=0 res=1 Feb 12 19:30:21.727525 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:30:21.727531 kernel: cpuidle: using governor menu Feb 12 19:30:21.727538 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:30:21.727544 kernel: ASID allocator initialised with 32768 entries Feb 12 19:30:21.727551 kernel: ACPI: bus type PCI registered Feb 12 19:30:21.727558 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:30:21.727613 kernel: Serial: AMBA PL011 UART driver Feb 12 19:30:21.727626 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:30:21.727633 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:30:21.727640 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:30:21.727649 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:30:21.727656 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:30:21.727662 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:30:21.727669 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:30:21.727675 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:30:21.727685 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:30:21.727691 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:30:21.727698 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:30:21.727704 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:30:21.727711 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:30:21.727718 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:30:21.727724 kernel: ACPI: Interpreter enabled Feb 12 19:30:21.727731 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:30:21.727737 kernel: ACPI: MCFG table detected, 1 entries Feb 12 19:30:21.727746 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:30:21.727752 kernel: printk: console [ttyAMA0] enabled Feb 12 19:30:21.727759 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:30:21.727892 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:30:21.727959 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 12 19:30:21.728018 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 12 19:30:21.728076 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Feb 12 19:30:21.728138 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Feb 12 19:30:21.728147 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Feb 12 19:30:21.728153 kernel: PCI host bridge to bus 0000:00 Feb 12 19:30:21.728219 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Feb 12 19:30:21.728276 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 12 19:30:21.728335 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Feb 12 19:30:21.728390 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:30:21.728525 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Feb 12 19:30:21.728599 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 19:30:21.728661 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Feb 12 19:30:21.728723 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Feb 12 19:30:21.728782 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Feb 12 19:30:21.728843 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Feb 12 19:30:21.728912 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Feb 12 19:30:21.728976 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Feb 12 19:30:21.729032 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Feb 12 19:30:21.729086 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 12 19:30:21.729139 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Feb 12 19:30:21.729148 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 12 19:30:21.729155 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 12 19:30:21.729162 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 12 19:30:21.729175 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 12 19:30:21.729182 kernel: iommu: Default domain type: Translated Feb 12 19:30:21.729189 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:30:21.729196 kernel: vgaarb: loaded Feb 12 19:30:21.729202 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:30:21.729209 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:30:21.729216 kernel: PTP clock support registered Feb 12 19:30:21.729223 kernel: Registered efivars operations Feb 12 19:30:21.729230 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:30:21.729238 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:30:21.729244 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:30:21.729251 kernel: pnp: PnP ACPI init Feb 12 19:30:21.729324 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Feb 12 19:30:21.729334 kernel: pnp: PnP ACPI: found 1 devices Feb 12 19:30:21.729341 kernel: NET: Registered PF_INET protocol family Feb 12 19:30:21.729348 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:30:21.729354 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:30:21.729361 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:30:21.729370 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:30:21.729377 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:30:21.729384 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:30:21.729390 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:30:21.729397 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:30:21.729404 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:30:21.729410 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:30:21.729417 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Feb 12 19:30:21.729425 kernel: kvm [1]: HYP mode not available Feb 12 19:30:21.729432 kernel: Initialise system trusted keyrings Feb 12 19:30:21.729439 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:30:21.729445 kernel: Key type asymmetric registered Feb 12 19:30:21.729452 kernel: Asymmetric key parser 'x509' registered Feb 12 19:30:21.729459 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:30:21.729465 kernel: io scheduler mq-deadline registered Feb 12 19:30:21.729472 kernel: io scheduler kyber registered Feb 12 19:30:21.729478 kernel: io scheduler bfq registered Feb 12 19:30:21.729493 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 12 19:30:21.729501 kernel: ACPI: button: Power Button [PWRB] Feb 12 19:30:21.729508 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 12 19:30:21.729572 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Feb 12 19:30:21.729581 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:30:21.729587 kernel: thunder_xcv, ver 1.0 Feb 12 19:30:21.729594 kernel: thunder_bgx, ver 1.0 Feb 12 19:30:21.729601 kernel: nicpf, ver 1.0 Feb 12 19:30:21.729607 kernel: nicvf, ver 1.0 Feb 12 19:30:21.729675 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:30:21.729734 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:30:21 UTC (1707766221) Feb 12 19:30:21.729743 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:30:21.729749 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:30:21.729756 kernel: Segment Routing with IPv6 Feb 12 19:30:21.729763 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:30:21.729770 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:30:21.729776 kernel: Key type dns_resolver registered Feb 12 19:30:21.729783 kernel: registered taskstats version 1 Feb 12 19:30:21.729791 kernel: Loading compiled-in X.509 certificates Feb 12 19:30:21.729798 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:30:21.729804 kernel: Key type .fscrypt registered Feb 12 19:30:21.729811 kernel: Key type fscrypt-provisioning registered Feb 12 19:30:21.729818 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:30:21.729824 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:30:21.729831 kernel: ima: No architecture policies found Feb 12 19:30:21.729841 kernel: Freeing unused kernel memory: 34688K Feb 12 19:30:21.729850 kernel: Run /init as init process Feb 12 19:30:21.729857 kernel: with arguments: Feb 12 19:30:21.729864 kernel: /init Feb 12 19:30:21.729877 kernel: with environment: Feb 12 19:30:21.729884 kernel: HOME=/ Feb 12 19:30:21.729890 kernel: TERM=linux Feb 12 19:30:21.729897 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:30:21.729906 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:30:21.729916 systemd[1]: Detected virtualization kvm. Feb 12 19:30:21.729924 systemd[1]: Detected architecture arm64. Feb 12 19:30:21.729931 systemd[1]: Running in initrd. Feb 12 19:30:21.729938 systemd[1]: No hostname configured, using default hostname. Feb 12 19:30:21.729945 systemd[1]: Hostname set to . Feb 12 19:30:21.729953 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:30:21.729960 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:30:21.729967 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:30:21.729975 systemd[1]: Reached target cryptsetup.target. Feb 12 19:30:21.729982 systemd[1]: Reached target paths.target. Feb 12 19:30:21.729989 systemd[1]: Reached target slices.target. Feb 12 19:30:21.729996 systemd[1]: Reached target swap.target. Feb 12 19:30:21.730003 systemd[1]: Reached target timers.target. Feb 12 19:30:21.730011 systemd[1]: Listening on iscsid.socket. Feb 12 19:30:21.730018 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:30:21.730025 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:30:21.730033 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:30:21.730040 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:30:21.730047 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:30:21.730054 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:30:21.730062 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:30:21.730069 systemd[1]: Reached target sockets.target. Feb 12 19:30:21.730076 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:30:21.730083 systemd[1]: Finished network-cleanup.service. Feb 12 19:30:21.730090 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:30:21.730098 systemd[1]: Starting systemd-journald.service... Feb 12 19:30:21.730105 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:30:21.730112 systemd[1]: Starting systemd-resolved.service... Feb 12 19:30:21.730119 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:30:21.730126 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:30:21.730133 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:30:21.730140 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:30:21.730147 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:30:21.730155 kernel: audit: type=1130 audit(1707766221.725:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.730163 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:30:21.730170 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:30:21.730177 kernel: audit: type=1130 audit(1707766221.729:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.730187 systemd-journald[291]: Journal started Feb 12 19:30:21.730228 systemd-journald[291]: Runtime Journal (/run/log/journal/9612204933424e2aa18ac9f6665b4388) is 6.0M, max 48.7M, 42.6M free. Feb 12 19:30:21.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.722682 systemd-modules-load[292]: Inserted module 'overlay' Feb 12 19:30:21.733168 systemd[1]: Started systemd-journald.service. Feb 12 19:30:21.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.738500 kernel: audit: type=1130 audit(1707766221.735:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.744511 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:30:21.744681 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:30:21.750472 kernel: audit: type=1130 audit(1707766221.744:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.750515 kernel: Bridge firewalling registered Feb 12 19:30:21.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.747741 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:30:21.748177 systemd-modules-load[292]: Inserted module 'br_netfilter' Feb 12 19:30:21.751321 systemd-resolved[293]: Positive Trust Anchors: Feb 12 19:30:21.751328 systemd-resolved[293]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:30:21.751355 systemd-resolved[293]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:30:21.755508 systemd-resolved[293]: Defaulting to hostname 'linux'. Feb 12 19:30:21.766188 kernel: SCSI subsystem initialized Feb 12 19:30:21.766209 kernel: audit: type=1130 audit(1707766221.762:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.756265 systemd[1]: Started systemd-resolved.service. Feb 12 19:30:21.763388 systemd[1]: Reached target nss-lookup.target. Feb 12 19:30:21.769577 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:30:21.769596 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:30:21.769605 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:30:21.769614 dracut-cmdline[309]: dracut-dracut-053 Feb 12 19:30:21.771401 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:30:21.777561 systemd-modules-load[292]: Inserted module 'dm_multipath' Feb 12 19:30:21.778301 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:30:21.781502 kernel: audit: type=1130 audit(1707766221.778:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.779827 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:30:21.787393 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:30:21.790901 kernel: audit: type=1130 audit(1707766221.788:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.841515 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:30:21.852511 kernel: iscsi: registered transport (tcp) Feb 12 19:30:21.867513 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:30:21.867529 kernel: QLogic iSCSI HBA Driver Feb 12 19:30:21.903506 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:30:21.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.905173 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:30:21.907681 kernel: audit: type=1130 audit(1707766221.903:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:21.947509 kernel: raid6: neonx8 gen() 13766 MB/s Feb 12 19:30:21.964500 kernel: raid6: neonx8 xor() 10815 MB/s Feb 12 19:30:21.981498 kernel: raid6: neonx4 gen() 13546 MB/s Feb 12 19:30:21.998507 kernel: raid6: neonx4 xor() 11293 MB/s Feb 12 19:30:22.015501 kernel: raid6: neonx2 gen() 12960 MB/s Feb 12 19:30:22.032497 kernel: raid6: neonx2 xor() 10250 MB/s Feb 12 19:30:22.049497 kernel: raid6: neonx1 gen() 10546 MB/s Feb 12 19:30:22.066496 kernel: raid6: neonx1 xor() 8755 MB/s Feb 12 19:30:22.083497 kernel: raid6: int64x8 gen() 6294 MB/s Feb 12 19:30:22.100497 kernel: raid6: int64x8 xor() 3547 MB/s Feb 12 19:30:22.117497 kernel: raid6: int64x4 gen() 7229 MB/s Feb 12 19:30:22.134497 kernel: raid6: int64x4 xor() 3854 MB/s Feb 12 19:30:22.151497 kernel: raid6: int64x2 gen() 6150 MB/s Feb 12 19:30:22.168497 kernel: raid6: int64x2 xor() 3320 MB/s Feb 12 19:30:22.185498 kernel: raid6: int64x1 gen() 5040 MB/s Feb 12 19:30:22.202806 kernel: raid6: int64x1 xor() 2644 MB/s Feb 12 19:30:22.202821 kernel: raid6: using algorithm neonx8 gen() 13766 MB/s Feb 12 19:30:22.202834 kernel: raid6: .... xor() 10815 MB/s, rmw enabled Feb 12 19:30:22.202843 kernel: raid6: using neon recovery algorithm Feb 12 19:30:22.215041 kernel: xor: measuring software checksum speed Feb 12 19:30:22.216855 kernel: 8regs : 17282 MB/sec Feb 12 19:30:22.216870 kernel: 32regs : 20770 MB/sec Feb 12 19:30:22.217597 kernel: arm64_neon : 27920 MB/sec Feb 12 19:30:22.217608 kernel: xor: using function: arm64_neon (27920 MB/sec) Feb 12 19:30:22.282505 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:30:22.294113 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:30:22.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:22.297000 audit: BPF prog-id=7 op=LOAD Feb 12 19:30:22.297000 audit: BPF prog-id=8 op=LOAD Feb 12 19:30:22.297514 kernel: audit: type=1130 audit(1707766222.294:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:22.297672 systemd[1]: Starting systemd-udevd.service... Feb 12 19:30:22.312309 systemd-udevd[492]: Using default interface naming scheme 'v252'. Feb 12 19:30:22.316019 systemd[1]: Started systemd-udevd.service. Feb 12 19:30:22.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:22.317447 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:30:22.329234 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 12 19:30:22.359294 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:30:22.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:22.360766 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:30:22.402779 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:30:22.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:22.431955 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 19:30:22.433742 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:30:22.433774 kernel: GPT:9289727 != 19775487 Feb 12 19:30:22.433783 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:30:22.434536 kernel: GPT:9289727 != 19775487 Feb 12 19:30:22.434556 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:30:22.435531 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:30:22.445353 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:30:22.446381 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:30:22.450678 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:30:22.456099 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:30:22.458171 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (550) Feb 12 19:30:22.462642 systemd[1]: Starting disk-uuid.service... Feb 12 19:30:22.465829 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:30:22.469979 disk-uuid[562]: Primary Header is updated. Feb 12 19:30:22.469979 disk-uuid[562]: Secondary Entries is updated. Feb 12 19:30:22.469979 disk-uuid[562]: Secondary Header is updated. Feb 12 19:30:22.472654 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:30:23.484530 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:30:23.484772 disk-uuid[563]: The operation has completed successfully. Feb 12 19:30:23.506573 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:30:23.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.506666 systemd[1]: Finished disk-uuid.service. Feb 12 19:30:23.510852 systemd[1]: Starting verity-setup.service... Feb 12 19:30:23.530502 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:30:23.550699 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:30:23.553068 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:30:23.554696 systemd[1]: Finished verity-setup.service. Feb 12 19:30:23.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.601528 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:30:23.601777 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:30:23.602640 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:30:23.603346 systemd[1]: Starting ignition-setup.service... Feb 12 19:30:23.605557 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:30:23.611766 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:30:23.611805 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:30:23.611816 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:30:23.621516 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:30:23.627077 systemd[1]: Finished ignition-setup.service. Feb 12 19:30:23.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.629445 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:30:23.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.688000 audit: BPF prog-id=9 op=LOAD Feb 12 19:30:23.686953 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:30:23.689244 systemd[1]: Starting systemd-networkd.service... Feb 12 19:30:23.699196 ignition[653]: Ignition 2.14.0 Feb 12 19:30:23.699209 ignition[653]: Stage: fetch-offline Feb 12 19:30:23.699260 ignition[653]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:30:23.699270 ignition[653]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:30:23.699400 ignition[653]: parsed url from cmdline: "" Feb 12 19:30:23.699418 ignition[653]: no config URL provided Feb 12 19:30:23.699425 ignition[653]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:30:23.699433 ignition[653]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:30:23.699451 ignition[653]: op(1): [started] loading QEMU firmware config module Feb 12 19:30:23.699455 ignition[653]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 19:30:23.704380 ignition[653]: op(1): [finished] loading QEMU firmware config module Feb 12 19:30:23.704400 ignition[653]: QEMU firmware config was not found. Ignoring... Feb 12 19:30:23.713633 systemd-networkd[738]: lo: Link UP Feb 12 19:30:23.713646 systemd-networkd[738]: lo: Gained carrier Feb 12 19:30:23.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.714021 systemd-networkd[738]: Enumeration completed Feb 12 19:30:23.714193 systemd-networkd[738]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:30:23.715082 systemd-networkd[738]: eth0: Link UP Feb 12 19:30:23.715085 systemd-networkd[738]: eth0: Gained carrier Feb 12 19:30:23.715501 systemd[1]: Started systemd-networkd.service. Feb 12 19:30:23.716314 systemd[1]: Reached target network.target. Feb 12 19:30:23.717647 systemd[1]: Starting iscsiuio.service... Feb 12 19:30:23.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.726398 systemd[1]: Started iscsiuio.service. Feb 12 19:30:23.727844 systemd[1]: Starting iscsid.service... Feb 12 19:30:23.731165 iscsid[744]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:30:23.731165 iscsid[744]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:30:23.731165 iscsid[744]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:30:23.731165 iscsid[744]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:30:23.731165 iscsid[744]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:30:23.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.736620 ignition[653]: parsing config with SHA512: 0675476197bc6e67976061bf12f7195ea813d6289ce3b38c66fed2e6cdc94c251ae21a7e9aca998892c2108e01f29eeb5d17c777296ea1186346cf7afdec0c47 Feb 12 19:30:23.736897 systemd[1]: Started iscsid.service. Feb 12 19:30:23.743420 iscsid[744]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:30:23.737663 systemd-networkd[738]: eth0: DHCPv4 address 10.0.0.120/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:30:23.738446 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:30:23.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.749087 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:30:23.750059 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:30:23.751045 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:30:23.751875 systemd[1]: Reached target remote-fs.target. Feb 12 19:30:23.753396 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:30:23.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.761821 ignition[653]: fetch-offline: fetch-offline passed Feb 12 19:30:23.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.761330 unknown[653]: fetched base config from "system" Feb 12 19:30:23.761905 ignition[653]: Ignition finished successfully Feb 12 19:30:23.761337 unknown[653]: fetched user config from "qemu" Feb 12 19:30:23.761403 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:30:23.763215 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:30:23.763972 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 19:30:23.764730 systemd[1]: Starting ignition-kargs.service... Feb 12 19:30:23.777618 ignition[760]: Ignition 2.14.0 Feb 12 19:30:23.778342 ignition[760]: Stage: kargs Feb 12 19:30:23.778983 ignition[760]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:30:23.779702 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:30:23.781355 ignition[760]: kargs: kargs passed Feb 12 19:30:23.782020 ignition[760]: Ignition finished successfully Feb 12 19:30:23.784030 systemd[1]: Finished ignition-kargs.service. Feb 12 19:30:23.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.785451 systemd[1]: Starting ignition-disks.service... Feb 12 19:30:23.791723 ignition[766]: Ignition 2.14.0 Feb 12 19:30:23.791738 ignition[766]: Stage: disks Feb 12 19:30:23.791823 ignition[766]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:30:23.791832 ignition[766]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:30:23.793445 systemd[1]: Finished ignition-disks.service. Feb 12 19:30:23.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.792619 ignition[766]: disks: disks passed Feb 12 19:30:23.794753 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:30:23.792659 ignition[766]: Ignition finished successfully Feb 12 19:30:23.795704 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:30:23.796711 systemd[1]: Reached target local-fs.target. Feb 12 19:30:23.797826 systemd[1]: Reached target sysinit.target. Feb 12 19:30:23.798823 systemd[1]: Reached target basic.target. Feb 12 19:30:23.800684 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:30:23.813553 systemd-fsck[774]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 19:30:23.818376 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:30:23.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.820016 systemd[1]: Mounting sysroot.mount... Feb 12 19:30:23.827499 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:30:23.827910 systemd[1]: Mounted sysroot.mount. Feb 12 19:30:23.828678 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:30:23.831135 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:30:23.832265 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 19:30:23.832302 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:30:23.832326 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:30:23.833693 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:30:23.835312 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:30:23.841030 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:30:23.848500 initrd-setup-root[792]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:30:23.853225 initrd-setup-root[800]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:30:23.857987 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:30:23.886611 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:30:23.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.888329 systemd[1]: Starting ignition-mount.service... Feb 12 19:30:23.889539 systemd[1]: Starting sysroot-boot.service... Feb 12 19:30:23.894747 bash[825]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:30:23.903996 ignition[827]: INFO : Ignition 2.14.0 Feb 12 19:30:23.903996 ignition[827]: INFO : Stage: mount Feb 12 19:30:23.905236 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:30:23.905236 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:30:23.906715 ignition[827]: INFO : mount: mount passed Feb 12 19:30:23.906715 ignition[827]: INFO : Ignition finished successfully Feb 12 19:30:23.908042 systemd[1]: Finished ignition-mount.service. Feb 12 19:30:23.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:23.908874 systemd[1]: Finished sysroot-boot.service. Feb 12 19:30:23.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:24.562264 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:30:24.571502 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (835) Feb 12 19:30:24.573626 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:30:24.573641 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:30:24.573664 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:30:24.576592 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:30:24.578332 systemd[1]: Starting ignition-files.service... Feb 12 19:30:24.592072 ignition[855]: INFO : Ignition 2.14.0 Feb 12 19:30:24.592072 ignition[855]: INFO : Stage: files Feb 12 19:30:24.593282 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:30:24.593282 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:30:24.593282 ignition[855]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:30:24.595897 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:30:24.595897 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:30:24.595897 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:30:24.595897 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:30:24.599901 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:30:24.599901 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:30:24.599901 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 12 19:30:24.596287 unknown[855]: wrote ssh authorized keys file for user: core Feb 12 19:30:24.944972 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:30:25.186427 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 12 19:30:25.188588 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:30:25.188588 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:30:25.188588 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:30:25.242706 systemd-networkd[738]: eth0: Gained IPv6LL Feb 12 19:30:25.433470 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:30:25.560893 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 12 19:30:25.560893 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:30:25.560893 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:30:25.560893 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:30:25.608620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:30:26.008870 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 12 19:30:26.011047 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:30:26.011047 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:30:26.011047 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:30:26.035348 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:30:26.635926 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 12 19:30:26.638692 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:30:26.638692 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:30:26.638692 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:30:26.638692 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:30:26.638692 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:30:26.638692 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:30:26.638692 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Feb 12 19:30:26.638692 ignition[855]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:30:26.663375 ignition[855]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:30:26.663375 ignition[855]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Feb 12 19:30:26.663375 ignition[855]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 19:30:26.663375 ignition[855]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:30:26.687468 ignition[855]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:30:26.690374 ignition[855]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 19:30:26.690374 ignition[855]: INFO : files: op(12): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:30:26.690374 ignition[855]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:30:26.690374 ignition[855]: INFO : files: op(13): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:30:26.690374 ignition[855]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:30:26.690374 ignition[855]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:30:26.690374 ignition[855]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:30:26.690374 ignition[855]: INFO : files: files passed Feb 12 19:30:26.690374 ignition[855]: INFO : Ignition finished successfully Feb 12 19:30:26.711065 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 19:30:26.711086 kernel: audit: type=1130 audit(1707766226.691:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.711102 kernel: audit: type=1130 audit(1707766226.700:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.711113 kernel: audit: type=1130 audit(1707766226.704:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.711122 kernel: audit: type=1131 audit(1707766226.704:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.690534 systemd[1]: Finished ignition-files.service. Feb 12 19:30:26.693250 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:30:26.713096 initrd-setup-root-after-ignition[878]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 19:30:26.696508 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:30:26.715568 initrd-setup-root-after-ignition[881]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:30:26.697147 systemd[1]: Starting ignition-quench.service... Feb 12 19:30:26.699348 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:30:26.701139 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:30:26.701210 systemd[1]: Finished ignition-quench.service. Feb 12 19:30:26.704652 systemd[1]: Reached target ignition-complete.target. Feb 12 19:30:26.710598 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:30:26.723082 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:30:26.723176 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:30:26.728589 kernel: audit: type=1130 audit(1707766226.724:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.728610 kernel: audit: type=1131 audit(1707766226.724:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.724664 systemd[1]: Reached target initrd-fs.target. Feb 12 19:30:26.729305 systemd[1]: Reached target initrd.target. Feb 12 19:30:26.730474 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:30:26.731249 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:30:26.741935 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:30:26.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.743670 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:30:26.746260 kernel: audit: type=1130 audit(1707766226.742:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.752214 systemd[1]: Stopped target network.target. Feb 12 19:30:26.752939 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:30:26.753895 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:30:26.754935 systemd[1]: Stopped target timers.target. Feb 12 19:30:26.755933 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:30:26.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.756048 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:30:26.760225 kernel: audit: type=1131 audit(1707766226.756:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.757025 systemd[1]: Stopped target initrd.target. Feb 12 19:30:26.759806 systemd[1]: Stopped target basic.target. Feb 12 19:30:26.760789 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:30:26.761794 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:30:26.762869 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:30:26.763968 systemd[1]: Stopped target remote-fs.target. Feb 12 19:30:26.765043 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:30:26.766208 systemd[1]: Stopped target sysinit.target. Feb 12 19:30:26.767183 systemd[1]: Stopped target local-fs.target. Feb 12 19:30:26.768136 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:30:26.769168 systemd[1]: Stopped target swap.target. Feb 12 19:30:26.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.770122 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:30:26.774321 kernel: audit: type=1131 audit(1707766226.770:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.770240 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:30:26.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.771222 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:30:26.778138 kernel: audit: type=1131 audit(1707766226.774:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.773760 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:30:26.773878 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:30:26.775007 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:30:26.775097 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:30:26.777803 systemd[1]: Stopped target paths.target. Feb 12 19:30:26.778694 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:30:26.783516 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:30:26.784251 systemd[1]: Stopped target slices.target. Feb 12 19:30:26.785272 systemd[1]: Stopped target sockets.target. Feb 12 19:30:26.786191 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:30:26.786262 systemd[1]: Closed iscsid.socket. Feb 12 19:30:26.787070 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:30:26.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.787137 systemd[1]: Closed iscsiuio.socket. Feb 12 19:30:26.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.788115 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:30:26.788213 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:30:26.789177 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:30:26.789262 systemd[1]: Stopped ignition-files.service. Feb 12 19:30:26.791020 systemd[1]: Stopping ignition-mount.service... Feb 12 19:30:26.792461 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:30:26.794000 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:30:26.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.797965 ignition[895]: INFO : Ignition 2.14.0 Feb 12 19:30:26.797965 ignition[895]: INFO : Stage: umount Feb 12 19:30:26.797965 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:30:26.797965 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:30:26.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.794897 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:30:26.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.807732 ignition[895]: INFO : umount: umount passed Feb 12 19:30:26.807732 ignition[895]: INFO : Ignition finished successfully Feb 12 19:30:26.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.795857 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:30:26.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.796008 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:30:26.797529 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:30:26.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.797647 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:30:26.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.799587 systemd-networkd[738]: eth0: DHCPv6 lease lost Feb 12 19:30:26.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.804188 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:30:26.804932 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:30:26.805042 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:30:26.807800 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:30:26.807902 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:30:26.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.809736 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:30:26.821000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:30:26.809817 systemd[1]: Stopped ignition-mount.service. Feb 12 19:30:26.821000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:30:26.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.810827 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:30:26.810910 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:30:26.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.811871 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:30:26.811944 systemd[1]: Stopped ignition-disks.service. Feb 12 19:30:26.812996 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:30:26.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.813035 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:30:26.814087 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:30:26.814125 systemd[1]: Stopped ignition-setup.service. Feb 12 19:30:26.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.815833 systemd[1]: Stopping network-cleanup.service... Feb 12 19:30:26.818517 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:30:26.818588 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:30:26.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.819933 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:30:26.819980 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:30:26.822418 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:30:26.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.822465 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:30:26.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.824168 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:30:26.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.828757 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:30:26.829290 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:30:26.829372 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:30:26.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.832401 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:30:26.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.832500 systemd[1]: Stopped network-cleanup.service. Feb 12 19:30:26.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.836153 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:30:26.836269 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:30:26.838195 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:30:26.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.838232 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:30:26.841074 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:30:26.841112 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:30:26.842558 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:30:26.842609 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:30:26.843886 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:30:26.843930 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:30:26.845251 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:30:26.845295 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:30:26.847442 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:30:26.848739 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:30:26.848801 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:30:26.850832 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:30:26.850886 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:30:26.851773 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:30:26.851812 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:30:26.853938 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:30:26.854364 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:30:26.854450 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:30:26.888499 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:30:26.888596 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:30:26.890034 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:30:26.891094 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:30:26.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:26.891144 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:30:26.893089 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:30:26.899739 systemd[1]: Switching root. Feb 12 19:30:26.924903 iscsid[744]: iscsid shutting down. Feb 12 19:30:26.925412 systemd-journald[291]: Journal stopped Feb 12 19:30:29.094577 systemd-journald[291]: Received SIGTERM from PID 1 (systemd). Feb 12 19:30:29.094651 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:30:29.094664 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:30:29.094675 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:30:29.094685 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:30:29.094698 kernel: SELinux: policy capability open_perms=1 Feb 12 19:30:29.094715 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:30:29.094726 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:30:29.094736 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:30:29.094746 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:30:29.094760 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:30:29.094770 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:30:29.094780 systemd[1]: Successfully loaded SELinux policy in 36.307ms. Feb 12 19:30:29.094797 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.431ms. Feb 12 19:30:29.094812 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:30:29.094824 systemd[1]: Detected virtualization kvm. Feb 12 19:30:29.094837 systemd[1]: Detected architecture arm64. Feb 12 19:30:29.094862 systemd[1]: Detected first boot. Feb 12 19:30:29.094877 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:30:29.094888 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:30:29.094899 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:30:29.094910 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:30:29.094921 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:30:29.094933 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:30:29.094944 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:30:29.094956 systemd[1]: Stopped iscsiuio.service. Feb 12 19:30:29.094967 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:30:29.094978 systemd[1]: Stopped iscsid.service. Feb 12 19:30:29.094988 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:30:29.095003 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:30:29.095013 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:30:29.095025 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:30:29.095036 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:30:29.095049 systemd[1]: Created slice system-getty.slice. Feb 12 19:30:29.095060 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:30:29.095071 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:30:29.095081 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:30:29.095094 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:30:29.095105 systemd[1]: Created slice user.slice. Feb 12 19:30:29.095119 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:30:29.095130 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:30:29.095142 systemd[1]: Set up automount boot.automount. Feb 12 19:30:29.095153 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:30:29.095164 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:30:29.095175 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:30:29.095186 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:30:29.095196 systemd[1]: Reached target integritysetup.target. Feb 12 19:30:29.095207 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:30:29.095218 systemd[1]: Reached target remote-fs.target. Feb 12 19:30:29.095229 systemd[1]: Reached target slices.target. Feb 12 19:30:29.095241 systemd[1]: Reached target swap.target. Feb 12 19:30:29.095252 systemd[1]: Reached target torcx.target. Feb 12 19:30:29.095263 systemd[1]: Reached target veritysetup.target. Feb 12 19:30:29.095274 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:30:29.095285 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:30:29.095296 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:30:29.095308 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:30:29.095319 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:30:29.095331 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:30:29.095342 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:30:29.095355 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:30:29.095366 systemd[1]: Mounting media.mount... Feb 12 19:30:29.095377 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:30:29.095388 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:30:29.095399 systemd[1]: Mounting tmp.mount... Feb 12 19:30:29.095410 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:30:29.095421 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:30:29.095432 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:30:29.095452 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:30:29.095476 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:30:29.095503 systemd[1]: Starting modprobe@drm.service... Feb 12 19:30:29.095516 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:30:29.095526 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:30:29.095537 systemd[1]: Starting modprobe@loop.service... Feb 12 19:30:29.095548 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:30:29.095559 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:30:29.095570 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:30:29.095581 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:30:29.095593 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:30:29.095607 systemd[1]: Stopped systemd-journald.service. Feb 12 19:30:29.095618 systemd[1]: Starting systemd-journald.service... Feb 12 19:30:29.095629 kernel: fuse: init (API version 7.34) Feb 12 19:30:29.095639 kernel: loop: module loaded Feb 12 19:30:29.095651 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:30:29.095664 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:30:29.095675 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:30:29.095685 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:30:29.095696 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:30:29.095707 systemd[1]: Stopped verity-setup.service. Feb 12 19:30:29.095719 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:30:29.095730 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:30:29.095740 systemd[1]: Mounted media.mount. Feb 12 19:30:29.095750 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:30:29.095761 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:30:29.095771 systemd[1]: Mounted tmp.mount. Feb 12 19:30:29.095782 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:30:29.095794 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:30:29.095804 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:30:29.095818 systemd-journald[999]: Journal started Feb 12 19:30:29.095873 systemd-journald[999]: Runtime Journal (/run/log/journal/9612204933424e2aa18ac9f6665b4388) is 6.0M, max 48.7M, 42.6M free. Feb 12 19:30:26.998000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:30:27.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:30:27.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:30:27.154000 audit: BPF prog-id=10 op=LOAD Feb 12 19:30:27.154000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:30:27.154000 audit: BPF prog-id=11 op=LOAD Feb 12 19:30:27.154000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:30:27.217000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:30:27.217000 audit[928]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58ac a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:27.217000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:30:27.218000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:30:27.218000 audit[928]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5985 a2=1ed a3=0 items=2 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:27.218000 audit: CWD cwd="/" Feb 12 19:30:27.218000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:27.218000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:27.218000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:30:28.948000 audit: BPF prog-id=12 op=LOAD Feb 12 19:30:28.948000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:30:28.948000 audit: BPF prog-id=13 op=LOAD Feb 12 19:30:28.948000 audit: BPF prog-id=14 op=LOAD Feb 12 19:30:28.948000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:30:28.948000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:30:28.948000 audit: BPF prog-id=15 op=LOAD Feb 12 19:30:28.948000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:30:28.949000 audit: BPF prog-id=16 op=LOAD Feb 12 19:30:28.949000 audit: BPF prog-id=17 op=LOAD Feb 12 19:30:28.949000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:30:28.949000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:30:28.949000 audit: BPF prog-id=18 op=LOAD Feb 12 19:30:28.949000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:30:28.949000 audit: BPF prog-id=19 op=LOAD Feb 12 19:30:28.950000 audit: BPF prog-id=20 op=LOAD Feb 12 19:30:28.950000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:30:28.950000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:30:28.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:28.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:28.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:28.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:28.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:28.960000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:30:29.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.064000 audit: BPF prog-id=21 op=LOAD Feb 12 19:30:29.064000 audit: BPF prog-id=22 op=LOAD Feb 12 19:30:29.064000 audit: BPF prog-id=23 op=LOAD Feb 12 19:30:29.064000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:30:29.064000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:30:29.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.092000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:30:29.092000 audit[999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffe9db3890 a2=4000 a3=1 items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:29.092000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:30:29.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:27.215903 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:30:28.946675 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:30:27.216195 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:30:28.946688 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:30:27.216214 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:30:28.950848 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:30:27.216246 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:30:27.216255 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:30:27.216285 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:30:27.216297 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:30:29.097991 systemd[1]: Started systemd-journald.service. Feb 12 19:30:27.216517 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:30:29.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:27.216552 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:30:27.216564 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:30:27.217032 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:30:27.217065 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:30:27.217082 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:30:29.098459 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:30:27.217097 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:30:27.217114 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:30:29.098703 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:30:27.217126 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:30:28.679833 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:28Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:30:28.680107 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:28Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:30:28.680198 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:28Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:30:28.680347 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:28Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:30:28.680415 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:28Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:30:28.680476 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2024-02-12T19:30:28Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:30:29.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.099936 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:30:29.100105 systemd[1]: Finished modprobe@drm.service. Feb 12 19:30:29.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.101269 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:30:29.101414 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:30:29.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.102566 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:30:29.102708 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:30:29.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.103566 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:30:29.103707 systemd[1]: Finished modprobe@loop.service. Feb 12 19:30:29.104751 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:30:29.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.106004 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:30:29.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.107232 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:30:29.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.108445 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:30:29.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.109929 systemd[1]: Reached target network-pre.target. Feb 12 19:30:29.112040 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:30:29.114032 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:30:29.114772 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:30:29.116205 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:30:29.118014 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:30:29.118791 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:30:29.119942 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:30:29.120740 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:30:29.121722 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:30:29.123347 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:30:29.129362 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:30:29.130420 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:30:29.137649 systemd-journald[999]: Time spent on flushing to /var/log/journal/9612204933424e2aa18ac9f6665b4388 is 13.993ms for 1014 entries. Feb 12 19:30:29.137649 systemd-journald[999]: System Journal (/var/log/journal/9612204933424e2aa18ac9f6665b4388) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:30:29.166385 systemd-journald[999]: Received client request to flush runtime journal. Feb 12 19:30:29.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.141776 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:30:29.169003 udevadm[1031]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:30:29.143026 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:30:29.144024 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:30:29.146088 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:30:29.148429 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:30:29.155676 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:30:29.157898 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:30:29.167309 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:30:29.175395 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:30:29.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.538521 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:30:29.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.539000 audit: BPF prog-id=24 op=LOAD Feb 12 19:30:29.539000 audit: BPF prog-id=25 op=LOAD Feb 12 19:30:29.539000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:30:29.539000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:30:29.540668 systemd[1]: Starting systemd-udevd.service... Feb 12 19:30:29.559812 systemd-udevd[1035]: Using default interface naming scheme 'v252'. Feb 12 19:30:29.578660 systemd[1]: Started systemd-udevd.service. Feb 12 19:30:29.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.580000 audit: BPF prog-id=26 op=LOAD Feb 12 19:30:29.582601 systemd[1]: Starting systemd-networkd.service... Feb 12 19:30:29.594000 audit: BPF prog-id=27 op=LOAD Feb 12 19:30:29.594000 audit: BPF prog-id=28 op=LOAD Feb 12 19:30:29.594000 audit: BPF prog-id=29 op=LOAD Feb 12 19:30:29.595607 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:30:29.605356 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:30:29.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.624432 systemd[1]: Started systemd-userdbd.service. Feb 12 19:30:29.657187 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:30:29.675076 systemd-networkd[1045]: lo: Link UP Feb 12 19:30:29.675355 systemd-networkd[1045]: lo: Gained carrier Feb 12 19:30:29.675811 systemd-networkd[1045]: Enumeration completed Feb 12 19:30:29.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.675970 systemd[1]: Started systemd-networkd.service. Feb 12 19:30:29.676995 systemd-networkd[1045]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:30:29.681512 systemd-networkd[1045]: eth0: Link UP Feb 12 19:30:29.681522 systemd-networkd[1045]: eth0: Gained carrier Feb 12 19:30:29.688833 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:30:29.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.690634 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:30:29.701870 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:30:29.728631 systemd-networkd[1045]: eth0: DHCPv4 address 10.0.0.120/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:30:29.729351 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:30:29.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.730167 systemd[1]: Reached target cryptsetup.target. Feb 12 19:30:29.731889 systemd[1]: Starting lvm2-activation.service... Feb 12 19:30:29.742905 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:30:29.772436 systemd[1]: Finished lvm2-activation.service. Feb 12 19:30:29.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.773199 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:30:29.773820 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:30:29.773851 systemd[1]: Reached target local-fs.target. Feb 12 19:30:29.774391 systemd[1]: Reached target machines.target. Feb 12 19:30:29.776132 systemd[1]: Starting ldconfig.service... Feb 12 19:30:29.777022 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:30:29.777071 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:30:29.777974 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:30:29.780380 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:30:29.782312 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:30:29.783312 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:30:29.783356 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:30:29.784275 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:30:29.787942 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1071 (bootctl) Feb 12 19:30:29.789242 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:30:29.802283 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:30:29.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.809072 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:30:29.814205 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:30:29.817834 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:30:29.870064 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:30:29.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.893603 systemd-fsck[1081]: fsck.fat 4.2 (2021-01-31) Feb 12 19:30:29.893603 systemd-fsck[1081]: /dev/vda1: 236 files, 113719/258078 clusters Feb 12 19:30:29.898508 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:30:29.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:29.968027 ldconfig[1070]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:30:29.971276 systemd[1]: Finished ldconfig.service. Feb 12 19:30:29.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:30.084651 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:30:30.086061 systemd[1]: Mounting boot.mount... Feb 12 19:30:30.092908 systemd[1]: Mounted boot.mount. Feb 12 19:30:30.099506 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:30:30.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:30.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:30.155451 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:30:30.160903 systemd[1]: Starting audit-rules.service... Feb 12 19:30:30.162761 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:30:30.164775 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:30:30.168000 audit: BPF prog-id=30 op=LOAD Feb 12 19:30:30.170138 systemd[1]: Starting systemd-resolved.service... Feb 12 19:30:30.172000 audit: BPF prog-id=31 op=LOAD Feb 12 19:30:30.173618 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:30:30.178444 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:30:30.188000 audit[1095]: SYSTEM_BOOT pid=1095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:30:30.192029 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:30:30.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:30.193138 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:30:30.195101 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:30:30.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:30.198590 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:30:30.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:30.200914 systemd[1]: Starting systemd-update-done.service... Feb 12 19:30:30.211746 systemd[1]: Finished systemd-update-done.service. Feb 12 19:30:30.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:30.223000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:30:30.223000 audit[1105]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff78aa7a0 a2=420 a3=0 items=0 ppid=1084 pid=1105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:30.223000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:30:30.224629 augenrules[1105]: No rules Feb 12 19:30:30.225164 systemd[1]: Finished audit-rules.service. Feb 12 19:30:30.230188 systemd-resolved[1088]: Positive Trust Anchors: Feb 12 19:30:30.230548 systemd-resolved[1088]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:30:30.230720 systemd-resolved[1088]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:30:30.238345 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:30:30.239537 systemd-timesyncd[1094]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 19:30:30.239684 systemd[1]: Reached target time-set.target. Feb 12 19:30:30.241144 systemd-timesyncd[1094]: Initial clock synchronization to Mon 2024-02-12 19:30:29.919836 UTC. Feb 12 19:30:30.251308 systemd-resolved[1088]: Defaulting to hostname 'linux'. Feb 12 19:30:30.252889 systemd[1]: Started systemd-resolved.service. Feb 12 19:30:30.253617 systemd[1]: Reached target network.target. Feb 12 19:30:30.254202 systemd[1]: Reached target nss-lookup.target. Feb 12 19:30:30.254821 systemd[1]: Reached target sysinit.target. Feb 12 19:30:30.255475 systemd[1]: Started motdgen.path. Feb 12 19:30:30.256046 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:30:30.257026 systemd[1]: Started logrotate.timer. Feb 12 19:30:30.257914 systemd[1]: Started mdadm.timer. Feb 12 19:30:30.258625 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:30:30.259457 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:30:30.259498 systemd[1]: Reached target paths.target. Feb 12 19:30:30.260273 systemd[1]: Reached target timers.target. Feb 12 19:30:30.261565 systemd[1]: Listening on dbus.socket. Feb 12 19:30:30.263448 systemd[1]: Starting docker.socket... Feb 12 19:30:30.266940 systemd[1]: Listening on sshd.socket. Feb 12 19:30:30.267681 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:30:30.268145 systemd[1]: Listening on docker.socket. Feb 12 19:30:30.269035 systemd[1]: Reached target sockets.target. Feb 12 19:30:30.269784 systemd[1]: Reached target basic.target. Feb 12 19:30:30.270567 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:30:30.270602 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:30:30.271678 systemd[1]: Starting containerd.service... Feb 12 19:30:30.273385 systemd[1]: Starting dbus.service... Feb 12 19:30:30.275198 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:30:30.277180 systemd[1]: Starting extend-filesystems.service... Feb 12 19:30:30.281551 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:30:30.282742 systemd[1]: Starting motdgen.service... Feb 12 19:30:30.284028 jq[1115]: false Feb 12 19:30:30.285119 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:30:30.286896 systemd[1]: Starting prepare-critools.service... Feb 12 19:30:30.289020 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:30:30.291106 systemd[1]: Starting sshd-keygen.service... Feb 12 19:30:30.294686 systemd[1]: Starting systemd-logind.service... Feb 12 19:30:30.298731 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:30:30.298828 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:30:30.299358 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:30:30.300177 systemd[1]: Starting update-engine.service... Feb 12 19:30:30.301942 extend-filesystems[1116]: Found vda Feb 12 19:30:30.303199 extend-filesystems[1116]: Found vda1 Feb 12 19:30:30.303199 extend-filesystems[1116]: Found vda2 Feb 12 19:30:30.303199 extend-filesystems[1116]: Found vda3 Feb 12 19:30:30.303199 extend-filesystems[1116]: Found usr Feb 12 19:30:30.303199 extend-filesystems[1116]: Found vda4 Feb 12 19:30:30.303199 extend-filesystems[1116]: Found vda6 Feb 12 19:30:30.303199 extend-filesystems[1116]: Found vda7 Feb 12 19:30:30.303199 extend-filesystems[1116]: Found vda9 Feb 12 19:30:30.303199 extend-filesystems[1116]: Checking size of /dev/vda9 Feb 12 19:30:30.302852 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:30:30.320896 jq[1135]: true Feb 12 19:30:30.308016 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:30:30.308171 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:30:30.310727 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:30:30.310891 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:30:30.321999 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:30:30.322151 systemd[1]: Finished motdgen.service. Feb 12 19:30:30.322821 tar[1137]: ./ Feb 12 19:30:30.322821 tar[1137]: ./loopback Feb 12 19:30:30.329305 dbus-daemon[1114]: [system] SELinux support is enabled Feb 12 19:30:30.330190 tar[1138]: crictl Feb 12 19:30:30.330327 jq[1139]: true Feb 12 19:30:30.330774 systemd[1]: Started dbus.service. Feb 12 19:30:30.333658 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:30:30.333683 systemd[1]: Reached target system-config.target. Feb 12 19:30:30.334377 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:30:30.334395 systemd[1]: Reached target user-config.target. Feb 12 19:30:30.397258 tar[1137]: ./bandwidth Feb 12 19:30:30.400915 extend-filesystems[1116]: Resized partition /dev/vda9 Feb 12 19:30:30.415135 extend-filesystems[1168]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:30:30.418428 systemd-logind[1127]: Watching system buttons on /dev/input/event0 (Power Button) Feb 12 19:30:30.418880 systemd-logind[1127]: New seat seat0. Feb 12 19:30:30.422028 systemd[1]: Started systemd-logind.service. Feb 12 19:30:30.433513 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 19:30:30.461618 update_engine[1130]: I0212 19:30:30.461210 1130 main.cc:92] Flatcar Update Engine starting Feb 12 19:30:30.465466 systemd[1]: Started update-engine.service. Feb 12 19:30:30.469286 systemd[1]: Started locksmithd.service. Feb 12 19:30:30.480958 update_engine[1130]: I0212 19:30:30.465504 1130 update_check_scheduler.cc:74] Next update check in 2m20s Feb 12 19:30:30.486528 bash[1164]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:30:30.486685 env[1140]: time="2024-02-12T19:30:30.485751880Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:30:30.486945 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:30:30.489774 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 19:30:30.502175 extend-filesystems[1168]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:30:30.502175 extend-filesystems[1168]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 19:30:30.502175 extend-filesystems[1168]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 19:30:30.509377 extend-filesystems[1116]: Resized filesystem in /dev/vda9 Feb 12 19:30:30.503260 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:30:30.503417 systemd[1]: Finished extend-filesystems.service. Feb 12 19:30:30.514834 env[1140]: time="2024-02-12T19:30:30.514786880Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:30:30.515189 env[1140]: time="2024-02-12T19:30:30.515170080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:30:30.521766 tar[1137]: ./ptp Feb 12 19:30:30.523304 env[1140]: time="2024-02-12T19:30:30.523267040Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:30:30.523354 env[1140]: time="2024-02-12T19:30:30.523304080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:30:30.523572 env[1140]: time="2024-02-12T19:30:30.523549840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:30:30.523622 env[1140]: time="2024-02-12T19:30:30.523572800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:30:30.523622 env[1140]: time="2024-02-12T19:30:30.523587600Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:30:30.523622 env[1140]: time="2024-02-12T19:30:30.523598240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:30:30.523690 env[1140]: time="2024-02-12T19:30:30.523672800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:30:30.524053 env[1140]: time="2024-02-12T19:30:30.524018040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:30:30.524165 env[1140]: time="2024-02-12T19:30:30.524143880Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:30:30.524165 env[1140]: time="2024-02-12T19:30:30.524163400Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:30:30.524386 env[1140]: time="2024-02-12T19:30:30.524220680Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:30:30.524386 env[1140]: time="2024-02-12T19:30:30.524239520Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.530772720Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.530808120Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.530821720Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.530861600Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.530876720Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.530894800Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.530909240Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.531242000Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.531258240Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.531270800Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.531283360Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.531297200Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.531434040Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:30:30.533492 env[1140]: time="2024-02-12T19:30:30.531521480Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.531761920Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.531786120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.531799920Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.531949560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.531963600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.531975560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.531987720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.532000760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.532012400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.532023320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.532034000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.532047480Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.532159400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.532174400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.533829 env[1140]: time="2024-02-12T19:30:30.532186320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.534142 env[1140]: time="2024-02-12T19:30:30.532197400Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:30:30.534142 env[1140]: time="2024-02-12T19:30:30.532212320Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:30:30.534142 env[1140]: time="2024-02-12T19:30:30.532223280Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:30:30.534142 env[1140]: time="2024-02-12T19:30:30.532241240Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:30:30.534142 env[1140]: time="2024-02-12T19:30:30.532278520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:30:30.534243 env[1140]: time="2024-02-12T19:30:30.532506800Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:30:30.534243 env[1140]: time="2024-02-12T19:30:30.532570000Z" level=info msg="Connect containerd service" Feb 12 19:30:30.534243 env[1140]: time="2024-02-12T19:30:30.532606040Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:30:30.534243 env[1140]: time="2024-02-12T19:30:30.533206280Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:30:30.535311 env[1140]: time="2024-02-12T19:30:30.535290120Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:30:30.535403 env[1140]: time="2024-02-12T19:30:30.535391560Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:30:30.535508 env[1140]: time="2024-02-12T19:30:30.535494920Z" level=info msg="containerd successfully booted in 0.072403s" Feb 12 19:30:30.535553 systemd[1]: Started containerd.service. Feb 12 19:30:30.535867 env[1140]: time="2024-02-12T19:30:30.535833200Z" level=info msg="Start subscribing containerd event" Feb 12 19:30:30.535971 env[1140]: time="2024-02-12T19:30:30.535955800Z" level=info msg="Start recovering state" Feb 12 19:30:30.536085 env[1140]: time="2024-02-12T19:30:30.536072080Z" level=info msg="Start event monitor" Feb 12 19:30:30.536152 env[1140]: time="2024-02-12T19:30:30.536140360Z" level=info msg="Start snapshots syncer" Feb 12 19:30:30.536210 env[1140]: time="2024-02-12T19:30:30.536197440Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:30:30.536262 env[1140]: time="2024-02-12T19:30:30.536249880Z" level=info msg="Start streaming server" Feb 12 19:30:30.558776 tar[1137]: ./vlan Feb 12 19:30:30.570739 locksmithd[1170]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:30:30.593563 tar[1137]: ./host-device Feb 12 19:30:30.620424 tar[1137]: ./tuning Feb 12 19:30:30.645721 tar[1137]: ./vrf Feb 12 19:30:30.671365 tar[1137]: ./sbr Feb 12 19:30:30.696788 tar[1137]: ./tap Feb 12 19:30:30.726180 tar[1137]: ./dhcp Feb 12 19:30:30.806570 tar[1137]: ./static Feb 12 19:30:30.831692 tar[1137]: ./firewall Feb 12 19:30:30.841677 systemd[1]: Finished prepare-critools.service. Feb 12 19:30:30.869884 tar[1137]: ./macvlan Feb 12 19:30:30.903509 tar[1137]: ./dummy Feb 12 19:30:30.932061 tar[1137]: ./bridge Feb 12 19:30:30.963018 tar[1137]: ./ipvlan Feb 12 19:30:30.991553 tar[1137]: ./portmap Feb 12 19:30:31.017984 tar[1137]: ./host-local Feb 12 19:30:31.053343 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:30:31.386735 systemd-networkd[1045]: eth0: Gained IPv6LL Feb 12 19:30:31.891679 sshd_keygen[1143]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:30:31.907685 systemd[1]: Finished sshd-keygen.service. Feb 12 19:30:31.909970 systemd[1]: Starting issuegen.service... Feb 12 19:30:31.914253 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:30:31.914397 systemd[1]: Finished issuegen.service. Feb 12 19:30:31.916510 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:30:31.921936 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:30:31.923913 systemd[1]: Started getty@tty1.service. Feb 12 19:30:31.925735 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:30:31.926807 systemd[1]: Reached target getty.target. Feb 12 19:30:31.927598 systemd[1]: Reached target multi-user.target. Feb 12 19:30:31.929339 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:30:31.935428 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:30:31.935602 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:30:31.936566 systemd[1]: Startup finished in 651ms (kernel) + 5.381s (initrd) + 4.980s (userspace) = 11.013s. Feb 12 19:30:34.195511 systemd[1]: Created slice system-sshd.slice. Feb 12 19:30:34.196629 systemd[1]: Started sshd@0-10.0.0.120:22-10.0.0.1:58106.service. Feb 12 19:30:34.248621 sshd[1198]: Accepted publickey for core from 10.0.0.1 port 58106 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:34.253540 sshd[1198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:34.263661 systemd-logind[1127]: New session 1 of user core. Feb 12 19:30:34.264603 systemd[1]: Created slice user-500.slice. Feb 12 19:30:34.265707 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:30:34.274901 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:30:34.276273 systemd[1]: Starting user@500.service... Feb 12 19:30:34.280648 (systemd)[1201]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:34.340284 systemd[1201]: Queued start job for default target default.target. Feb 12 19:30:34.340766 systemd[1201]: Reached target paths.target. Feb 12 19:30:34.340784 systemd[1201]: Reached target sockets.target. Feb 12 19:30:34.340794 systemd[1201]: Reached target timers.target. Feb 12 19:30:34.340804 systemd[1201]: Reached target basic.target. Feb 12 19:30:34.340854 systemd[1201]: Reached target default.target. Feb 12 19:30:34.340880 systemd[1201]: Startup finished in 54ms. Feb 12 19:30:34.340945 systemd[1]: Started user@500.service. Feb 12 19:30:34.341898 systemd[1]: Started session-1.scope. Feb 12 19:30:34.391611 systemd[1]: Started sshd@1-10.0.0.120:22-10.0.0.1:58110.service. Feb 12 19:30:34.435024 sshd[1210]: Accepted publickey for core from 10.0.0.1 port 58110 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:34.436589 sshd[1210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:34.440688 systemd-logind[1127]: New session 2 of user core. Feb 12 19:30:34.440936 systemd[1]: Started session-2.scope. Feb 12 19:30:34.494898 sshd[1210]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:34.499257 systemd[1]: Started sshd@2-10.0.0.120:22-10.0.0.1:58116.service. Feb 12 19:30:34.500832 systemd[1]: sshd@1-10.0.0.120:22-10.0.0.1:58110.service: Deactivated successfully. Feb 12 19:30:34.501704 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:30:34.502220 systemd-logind[1127]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:30:34.502949 systemd-logind[1127]: Removed session 2. Feb 12 19:30:34.544677 sshd[1215]: Accepted publickey for core from 10.0.0.1 port 58116 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:34.545898 sshd[1215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:34.549580 systemd-logind[1127]: New session 3 of user core. Feb 12 19:30:34.550024 systemd[1]: Started session-3.scope. Feb 12 19:30:34.600687 sshd[1215]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:34.605527 systemd[1]: sshd@2-10.0.0.120:22-10.0.0.1:58116.service: Deactivated successfully. Feb 12 19:30:34.606090 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:30:34.606726 systemd-logind[1127]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:30:34.607760 systemd[1]: Started sshd@3-10.0.0.120:22-10.0.0.1:58118.service. Feb 12 19:30:34.609670 systemd-logind[1127]: Removed session 3. Feb 12 19:30:34.651190 sshd[1223]: Accepted publickey for core from 10.0.0.1 port 58118 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:34.652366 sshd[1223]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:34.656045 systemd-logind[1127]: New session 4 of user core. Feb 12 19:30:34.656497 systemd[1]: Started session-4.scope. Feb 12 19:30:34.708894 sshd[1223]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:34.712389 systemd[1]: Started sshd@4-10.0.0.120:22-10.0.0.1:58126.service. Feb 12 19:30:34.712888 systemd[1]: sshd@3-10.0.0.120:22-10.0.0.1:58118.service: Deactivated successfully. Feb 12 19:30:34.713449 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:30:34.714020 systemd-logind[1127]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:30:34.715476 systemd-logind[1127]: Removed session 4. Feb 12 19:30:34.757536 sshd[1228]: Accepted publickey for core from 10.0.0.1 port 58126 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:34.758194 sshd[1228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:34.761442 systemd-logind[1127]: New session 5 of user core. Feb 12 19:30:34.762273 systemd[1]: Started session-5.scope. Feb 12 19:30:34.819858 sudo[1232]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:30:34.820077 sudo[1232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:30:34.831653 dbus-daemon[1114]: avc: received setenforce notice (enforcing=1) Feb 12 19:30:34.832509 sudo[1232]: pam_unix(sudo:session): session closed for user root Feb 12 19:30:34.834804 sshd[1228]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:34.837545 systemd[1]: sshd@4-10.0.0.120:22-10.0.0.1:58126.service: Deactivated successfully. Feb 12 19:30:34.838167 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:30:34.838788 systemd-logind[1127]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:30:34.839900 systemd[1]: Started sshd@5-10.0.0.120:22-10.0.0.1:58140.service. Feb 12 19:30:34.840538 systemd-logind[1127]: Removed session 5. Feb 12 19:30:34.883824 sshd[1236]: Accepted publickey for core from 10.0.0.1 port 58140 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:34.885353 sshd[1236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:34.888788 systemd-logind[1127]: New session 6 of user core. Feb 12 19:30:34.889602 systemd[1]: Started session-6.scope. Feb 12 19:30:34.940795 sudo[1240]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:30:34.941075 sudo[1240]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:30:34.943789 sudo[1240]: pam_unix(sudo:session): session closed for user root Feb 12 19:30:34.948243 sudo[1239]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:30:34.948472 sudo[1239]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:30:34.958013 systemd[1]: Stopping audit-rules.service... Feb 12 19:30:34.958000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:30:34.959311 auditctl[1243]: No rules Feb 12 19:30:34.959588 kernel: kauditd_printk_skb: 138 callbacks suppressed Feb 12 19:30:34.959624 kernel: audit: type=1305 audit(1707766234.958:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:30:34.959665 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:30:34.959824 systemd[1]: Stopped audit-rules.service. Feb 12 19:30:34.958000 audit[1243]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeebddbf0 a2=420 a3=0 items=0 ppid=1 pid=1243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:34.961236 systemd[1]: Starting audit-rules.service... Feb 12 19:30:34.963251 kernel: audit: type=1300 audit(1707766234.958:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeebddbf0 a2=420 a3=0 items=0 ppid=1 pid=1243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:34.963313 kernel: audit: type=1327 audit(1707766234.958:171): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:30:34.958000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:30:34.964572 kernel: audit: type=1131 audit(1707766234.959:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.976688 augenrules[1260]: No rules Feb 12 19:30:34.977380 systemd[1]: Finished audit-rules.service. Feb 12 19:30:34.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.979854 sudo[1239]: pam_unix(sudo:session): session closed for user root Feb 12 19:30:34.980532 kernel: audit: type=1130 audit(1707766234.976:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.980772 kernel: audit: type=1106 audit(1707766234.979:174): pid=1239 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.979000 audit[1239]: USER_END pid=1239 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.979000 audit[1239]: CRED_DISP pid=1239 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.983681 sshd[1236]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:34.985101 systemd[1]: Started sshd@6-10.0.0.120:22-10.0.0.1:58144.service. Feb 12 19:30:34.985801 kernel: audit: type=1104 audit(1707766234.979:175): pid=1239 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.985852 kernel: audit: type=1130 audit(1707766234.984:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.120:22-10.0.0.1:58144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.120:22-10.0.0.1:58144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:34.987000 audit[1236]: USER_END pid=1236 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:34.989413 systemd[1]: sshd@5-10.0.0.120:22-10.0.0.1:58140.service: Deactivated successfully. Feb 12 19:30:34.990239 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:30:34.990842 systemd-logind[1127]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:30:34.991378 kernel: audit: type=1106 audit(1707766234.987:177): pid=1236 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:34.991571 kernel: audit: type=1104 audit(1707766234.987:178): pid=1236 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:34.987000 audit[1236]: CRED_DISP pid=1236 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:34.991947 systemd-logind[1127]: Removed session 6. Feb 12 19:30:34.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.120:22-10.0.0.1:58140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:35.030000 audit[1265]: USER_ACCT pid=1265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:35.031271 sshd[1265]: Accepted publickey for core from 10.0.0.1 port 58144 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:35.032000 audit[1265]: CRED_ACQ pid=1265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:35.032000 audit[1265]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea30ac50 a2=3 a3=1 items=0 ppid=1 pid=1265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:35.032000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:35.033433 sshd[1265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:35.038332 systemd[1]: Started session-7.scope. Feb 12 19:30:35.038662 systemd-logind[1127]: New session 7 of user core. Feb 12 19:30:35.041000 audit[1265]: USER_START pid=1265 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:35.042000 audit[1268]: CRED_ACQ pid=1268 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:35.090000 audit[1269]: USER_ACCT pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:35.091835 sudo[1269]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:30:35.090000 audit[1269]: CRED_REFR pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:35.092031 sudo[1269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:30:35.091000 audit[1269]: USER_START pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:35.605229 systemd[1]: Reloading. Feb 12 19:30:35.657638 /usr/lib/systemd/system-generators/torcx-generator[1299]: time="2024-02-12T19:30:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:30:35.657669 /usr/lib/systemd/system-generators/torcx-generator[1299]: time="2024-02-12T19:30:35Z" level=info msg="torcx already run" Feb 12 19:30:35.732916 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:30:35.732940 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:30:35.762094 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.813000 audit: BPF prog-id=37 op=LOAD Feb 12 19:30:35.813000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit: BPF prog-id=38 op=LOAD Feb 12 19:30:35.814000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit: BPF prog-id=39 op=LOAD Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.814000 audit: BPF prog-id=40 op=LOAD Feb 12 19:30:35.814000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:30:35.814000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.815000 audit: BPF prog-id=41 op=LOAD Feb 12 19:30:35.815000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.816000 audit: BPF prog-id=42 op=LOAD Feb 12 19:30:35.816000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:30:35.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit: BPF prog-id=43 op=LOAD Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit: BPF prog-id=44 op=LOAD Feb 12 19:30:35.818000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:30:35.818000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit: BPF prog-id=45 op=LOAD Feb 12 19:30:35.818000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit: BPF prog-id=46 op=LOAD Feb 12 19:30:35.818000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit: BPF prog-id=47 op=LOAD Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit: BPF prog-id=48 op=LOAD Feb 12 19:30:35.819000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:30:35.819000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit: BPF prog-id=49 op=LOAD Feb 12 19:30:35.819000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit: BPF prog-id=50 op=LOAD Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.820000 audit: BPF prog-id=51 op=LOAD Feb 12 19:30:35.820000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:30:35.820000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:30:35.826590 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:30:35.838255 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:30:35.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:35.838741 systemd[1]: Reached target network-online.target. Feb 12 19:30:35.840168 systemd[1]: Started kubelet.service. Feb 12 19:30:35.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:35.853555 systemd[1]: Starting coreos-metadata.service... Feb 12 19:30:35.863100 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 12 19:30:35.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:35.863432 systemd[1]: Finished coreos-metadata.service. Feb 12 19:30:35.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:35.961172 kubelet[1336]: E0212 19:30:35.961122 1336 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:30:35.963140 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:30:35.963260 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:30:35.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:30:36.219429 systemd[1]: Stopped kubelet.service. Feb 12 19:30:36.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:36.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:36.233724 systemd[1]: Reloading. Feb 12 19:30:36.274769 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2024-02-12T19:30:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:30:36.274796 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2024-02-12T19:30:36Z" level=info msg="torcx already run" Feb 12 19:30:36.398748 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:30:36.398900 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:30:36.419913 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:30:36.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.472000 audit: BPF prog-id=52 op=LOAD Feb 12 19:30:36.472000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit: BPF prog-id=53 op=LOAD Feb 12 19:30:36.474000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit: BPF prog-id=54 op=LOAD Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.475000 audit: BPF prog-id=55 op=LOAD Feb 12 19:30:36.475000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:30:36.475000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit: BPF prog-id=56 op=LOAD Feb 12 19:30:36.476000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.477000 audit: BPF prog-id=57 op=LOAD Feb 12 19:30:36.477000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.479000 audit: BPF prog-id=58 op=LOAD Feb 12 19:30:36.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.480000 audit: BPF prog-id=59 op=LOAD Feb 12 19:30:36.481000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:30:36.481000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit: BPF prog-id=60 op=LOAD Feb 12 19:30:36.482000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit: BPF prog-id=61 op=LOAD Feb 12 19:30:36.483000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit: BPF prog-id=62 op=LOAD Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.484000 audit: BPF prog-id=63 op=LOAD Feb 12 19:30:36.484000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:30:36.484000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.485000 audit: BPF prog-id=64 op=LOAD Feb 12 19:30:36.485000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit: BPF prog-id=65 op=LOAD Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:36.487000 audit: BPF prog-id=66 op=LOAD Feb 12 19:30:36.487000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:30:36.487000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:30:36.498891 systemd[1]: Started kubelet.service. Feb 12 19:30:36.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:36.538537 kubelet[1444]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:30:36.538537 kubelet[1444]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:30:36.538537 kubelet[1444]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:30:36.538866 kubelet[1444]: I0212 19:30:36.538603 1444 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:30:37.459273 kubelet[1444]: I0212 19:30:37.459227 1444 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:30:37.459273 kubelet[1444]: I0212 19:30:37.459259 1444 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:30:37.459462 kubelet[1444]: I0212 19:30:37.459447 1444 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:30:37.462995 kubelet[1444]: I0212 19:30:37.462970 1444 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:30:37.464767 kubelet[1444]: W0212 19:30:37.464747 1444 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:30:37.465375 kubelet[1444]: I0212 19:30:37.465356 1444 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:30:37.465579 kubelet[1444]: I0212 19:30:37.465568 1444 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:30:37.465642 kubelet[1444]: I0212 19:30:37.465630 1444 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:30:37.465720 kubelet[1444]: I0212 19:30:37.465654 1444 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:30:37.465720 kubelet[1444]: I0212 19:30:37.465664 1444 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:30:37.465775 kubelet[1444]: I0212 19:30:37.465764 1444 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:30:37.472423 kubelet[1444]: I0212 19:30:37.472396 1444 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:30:37.472423 kubelet[1444]: I0212 19:30:37.472423 1444 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:30:37.472557 kubelet[1444]: I0212 19:30:37.472446 1444 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:30:37.472557 kubelet[1444]: I0212 19:30:37.472458 1444 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:30:37.472712 kubelet[1444]: E0212 19:30:37.472690 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:37.472753 kubelet[1444]: E0212 19:30:37.472745 1444 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:37.474875 kubelet[1444]: I0212 19:30:37.474844 1444 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:30:37.475349 kubelet[1444]: W0212 19:30:37.475324 1444 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:30:37.476036 kubelet[1444]: I0212 19:30:37.476014 1444 server.go:1168] "Started kubelet" Feb 12 19:30:37.476219 kubelet[1444]: I0212 19:30:37.476196 1444 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:30:37.476696 kubelet[1444]: I0212 19:30:37.476681 1444 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:30:37.476892 kubelet[1444]: E0212 19:30:37.476742 1444 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:30:37.476935 kubelet[1444]: E0212 19:30:37.476901 1444 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:30:37.478560 kubelet[1444]: I0212 19:30:37.478542 1444 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:30:37.478000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:37.478000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:30:37.478000 audit[1444]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c2cd80 a1=4000299a28 a2=4000c2cd50 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.478000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:30:37.479000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:37.479000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:30:37.479000 audit[1444]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000998920 a1=4000299a58 a2=4000c2ce10 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.479000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:30:37.479858 kubelet[1444]: I0212 19:30:37.479499 1444 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:30:37.479858 kubelet[1444]: I0212 19:30:37.479535 1444 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:30:37.479858 kubelet[1444]: I0212 19:30:37.479618 1444 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:30:37.479858 kubelet[1444]: I0212 19:30:37.479784 1444 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:30:37.479858 kubelet[1444]: I0212 19:30:37.479848 1444 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:30:37.489803 kubelet[1444]: W0212 19:30:37.489753 1444 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:30:37.489803 kubelet[1444]: E0212 19:30:37.489809 1444 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:30:37.492359 kubelet[1444]: W0212 19:30:37.492332 1444 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:30:37.492359 kubelet[1444]: E0212 19:30:37.492358 1444 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:30:37.492448 kubelet[1444]: W0212 19:30:37.492390 1444 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:30:37.492448 kubelet[1444]: E0212 19:30:37.492398 1444 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:30:37.492547 kubelet[1444]: E0212 19:30:37.492448 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345848297136", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 475991862, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 475991862, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.492707 kubelet[1444]: E0212 19:30:37.492691 1444 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 19:30:37.496092 kubelet[1444]: E0212 19:30:37.495015 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345848372736", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 476890422, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 476890422, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.506512 kubelet[1444]: I0212 19:30:37.506054 1444 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:30:37.506512 kubelet[1444]: I0212 19:30:37.506073 1444 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:30:37.506512 kubelet[1444]: I0212 19:30:37.506090 1444 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:30:37.507864 kubelet[1444]: E0212 19:30:37.507063 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e9157e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505328510, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505328510, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.509134 kubelet[1444]: I0212 19:30:37.509103 1444 policy_none.go:49] "None policy: Start" Feb 12 19:30:37.509432 kubelet[1444]: E0212 19:30:37.509338 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e92574", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505332596, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505332596, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.509898 kubelet[1444]: I0212 19:30:37.509875 1444 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:30:37.509967 kubelet[1444]: I0212 19:30:37.509903 1444 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:30:37.512852 kubelet[1444]: E0212 19:30:37.512644 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e936f2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505337074, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505337074, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.511000 audit[1461]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:37.511000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb899470 a2=0 a3=1 items=0 ppid=1444 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:30:37.512000 audit[1463]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:37.512000 audit[1463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff3eb0ff0 a2=0 a3=1 items=0 ppid=1444 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:30:37.516121 systemd[1]: Created slice kubepods.slice. Feb 12 19:30:37.519925 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:30:37.522514 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:30:37.532305 kubelet[1444]: I0212 19:30:37.532267 1444 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:30:37.531000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:37.531000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:30:37.531000 audit[1444]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c2d9b0 a1=4000d28918 a2=4000c2d980 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.531000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:30:37.532564 kubelet[1444]: I0212 19:30:37.532366 1444 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:30:37.532612 kubelet[1444]: I0212 19:30:37.532580 1444 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:30:37.533087 kubelet[1444]: E0212 19:30:37.533061 1444 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.120\" not found" Feb 12 19:30:37.517000 audit[1465]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:37.517000 audit[1465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd8de9850 a2=0 a3=1 items=0 ppid=1444 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.517000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:30:37.536928 kubelet[1444]: E0212 19:30:37.536853 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b334584ba1c0b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 534208179, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 534208179, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.537000 audit[1470]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:37.537000 audit[1470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff9243760 a2=0 a3=1 items=0 ppid=1444 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:30:37.573000 audit[1475]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:37.573000 audit[1475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe4be66c0 a2=0 a3=1 items=0 ppid=1444 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:30:37.574781 kubelet[1444]: I0212 19:30:37.574727 1444 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:30:37.573000 audit[1476]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:37.573000 audit[1476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdd034590 a2=0 a3=1 items=0 ppid=1444 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:30:37.574000 audit[1477]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:37.574000 audit[1477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5187ca0 a2=0 a3=1 items=0 ppid=1444 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:30:37.575715 kubelet[1444]: I0212 19:30:37.575685 1444 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:30:37.575715 kubelet[1444]: I0212 19:30:37.575709 1444 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:30:37.575765 kubelet[1444]: I0212 19:30:37.575727 1444 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:30:37.575789 kubelet[1444]: E0212 19:30:37.575779 1444 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:30:37.575000 audit[1478]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:37.575000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb3c3750 a2=0 a3=1 items=0 ppid=1444 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:30:37.577278 kubelet[1444]: W0212 19:30:37.577250 1444 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:30:37.577345 kubelet[1444]: E0212 19:30:37.577281 1444 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:30:37.576000 audit[1479]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:37.576000 audit[1479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcdd23650 a2=0 a3=1 items=0 ppid=1444 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:30:37.576000 audit[1480]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:37.576000 audit[1480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffce53a10 a2=0 a3=1 items=0 ppid=1444 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:30:37.577000 audit[1481]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:37.577000 audit[1481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0e1c9f0 a2=0 a3=1 items=0 ppid=1444 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:30:37.577000 audit[1482]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:37.577000 audit[1482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc540ef90 a2=0 a3=1 items=0 ppid=1444 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:37.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:30:37.582799 kubelet[1444]: I0212 19:30:37.582774 1444 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 12 19:30:37.585092 kubelet[1444]: E0212 19:30:37.585068 1444 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 12 19:30:37.585519 kubelet[1444]: E0212 19:30:37.585436 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e9157e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505328510, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 582725593, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e9157e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.586397 kubelet[1444]: E0212 19:30:37.586337 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e92574", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505332596, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 582730582, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e92574" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.587326 kubelet[1444]: E0212 19:30:37.587269 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e936f2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505337074, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 582738006, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e936f2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.694127 kubelet[1444]: E0212 19:30:37.694088 1444 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 19:30:37.786008 kubelet[1444]: I0212 19:30:37.785983 1444 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 12 19:30:37.787571 kubelet[1444]: E0212 19:30:37.787553 1444 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 12 19:30:37.787621 kubelet[1444]: E0212 19:30:37.787501 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e9157e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505328510, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 785951103, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e9157e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.788345 kubelet[1444]: E0212 19:30:37.788291 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e92574", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505332596, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 785956170, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e92574" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:37.789172 kubelet[1444]: E0212 19:30:37.789120 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e936f2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505337074, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 785959038, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e936f2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:38.095525 kubelet[1444]: E0212 19:30:38.095414 1444 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 19:30:38.188452 kubelet[1444]: I0212 19:30:38.188419 1444 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 12 19:30:38.189964 kubelet[1444]: E0212 19:30:38.189941 1444 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 12 19:30:38.190037 kubelet[1444]: E0212 19:30:38.189968 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e9157e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505328510, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 38, 188377702, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e9157e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:38.191273 kubelet[1444]: E0212 19:30:38.191163 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e92574", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505332596, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 38, 188389514, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e92574" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:38.192186 kubelet[1444]: E0212 19:30:38.192120 1444 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3345849e936f2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 30, 37, 505337074, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 30, 38, 188392506, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.120.17b3345849e936f2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:30:38.356065 kubelet[1444]: W0212 19:30:38.355957 1444 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:30:38.356065 kubelet[1444]: E0212 19:30:38.355991 1444 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:30:38.377266 kubelet[1444]: W0212 19:30:38.377238 1444 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:30:38.377266 kubelet[1444]: E0212 19:30:38.377268 1444 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:30:38.461704 kubelet[1444]: I0212 19:30:38.461674 1444 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 19:30:38.472992 kubelet[1444]: E0212 19:30:38.472964 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:38.856414 kubelet[1444]: E0212 19:30:38.856375 1444 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.120" not found Feb 12 19:30:38.902903 kubelet[1444]: E0212 19:30:38.902866 1444 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.120\" not found" node="10.0.0.120" Feb 12 19:30:38.990943 kubelet[1444]: I0212 19:30:38.990918 1444 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 12 19:30:38.998315 kubelet[1444]: I0212 19:30:38.998285 1444 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.120" Feb 12 19:30:39.027636 kubelet[1444]: E0212 19:30:39.027591 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.059000 audit[1269]: USER_END pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:39.059000 audit[1269]: CRED_DISP pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:39.061159 sudo[1269]: pam_unix(sudo:session): session closed for user root Feb 12 19:30:39.064128 sshd[1265]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:39.063000 audit[1265]: USER_END pid=1265 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.063000 audit[1265]: CRED_DISP pid=1265 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.066494 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:30:39.067117 systemd-logind[1127]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:30:39.067270 systemd[1]: sshd@6-10.0.0.120:22-10.0.0.1:58144.service: Deactivated successfully. Feb 12 19:30:39.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.120:22-10.0.0.1:58144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:39.068367 systemd-logind[1127]: Removed session 7. Feb 12 19:30:39.128448 kubelet[1444]: E0212 19:30:39.128307 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.229243 kubelet[1444]: E0212 19:30:39.229190 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.329725 kubelet[1444]: E0212 19:30:39.329677 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.430261 kubelet[1444]: E0212 19:30:39.430131 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.473578 kubelet[1444]: E0212 19:30:39.473527 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:39.531035 kubelet[1444]: E0212 19:30:39.531005 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.631637 kubelet[1444]: E0212 19:30:39.631568 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.732199 kubelet[1444]: E0212 19:30:39.732041 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.832605 kubelet[1444]: E0212 19:30:39.832528 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:39.933042 kubelet[1444]: E0212 19:30:39.932972 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:40.033657 kubelet[1444]: E0212 19:30:40.033589 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:40.134105 kubelet[1444]: E0212 19:30:40.134045 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:40.234600 kubelet[1444]: E0212 19:30:40.234514 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:40.335107 kubelet[1444]: E0212 19:30:40.334979 1444 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 19:30:40.436415 kubelet[1444]: I0212 19:30:40.436377 1444 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 19:30:40.436717 env[1140]: time="2024-02-12T19:30:40.436664610Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:30:40.436958 kubelet[1444]: I0212 19:30:40.436820 1444 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 19:30:40.473565 kubelet[1444]: I0212 19:30:40.473533 1444 apiserver.go:52] "Watching apiserver" Feb 12 19:30:40.473864 kubelet[1444]: E0212 19:30:40.473834 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:40.476655 kubelet[1444]: I0212 19:30:40.476598 1444 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:40.476790 kubelet[1444]: I0212 19:30:40.476684 1444 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:40.476790 kubelet[1444]: I0212 19:30:40.476716 1444 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:40.476976 kubelet[1444]: E0212 19:30:40.476953 1444 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8xnbj" podUID=627c7e44-d6dd-4aec-98a9-5d77abc8e0c0 Feb 12 19:30:40.482515 kubelet[1444]: I0212 19:30:40.482197 1444 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:30:40.482553 systemd[1]: Created slice kubepods-besteffort-pod448b0e5e_efea_4c34_8361_a80abb9d7434.slice. Feb 12 19:30:40.495022 kubelet[1444]: I0212 19:30:40.494992 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4s9rr\" (UniqueName: \"kubernetes.io/projected/1c415565-3196-46a4-8eaa-b89c92d322dc-kube-api-access-4s9rr\") pod \"kube-proxy-vrm75\" (UID: \"1c415565-3196-46a4-8eaa-b89c92d322dc\") " pod="kube-system/kube-proxy-vrm75" Feb 12 19:30:40.495797 kubelet[1444]: I0212 19:30:40.495764 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-var-lib-calico\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.496016 kubelet[1444]: I0212 19:30:40.495999 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1c415565-3196-46a4-8eaa-b89c92d322dc-lib-modules\") pod \"kube-proxy-vrm75\" (UID: \"1c415565-3196-46a4-8eaa-b89c92d322dc\") " pod="kube-system/kube-proxy-vrm75" Feb 12 19:30:40.496122 kubelet[1444]: I0212 19:30:40.496110 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-lib-modules\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.496211 kubelet[1444]: I0212 19:30:40.496198 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-policysync\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.496900 kubelet[1444]: I0212 19:30:40.496878 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/448b0e5e-efea-4c34-8361-a80abb9d7434-node-certs\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.497014 kubelet[1444]: I0212 19:30:40.497002 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/627c7e44-d6dd-4aec-98a9-5d77abc8e0c0-kubelet-dir\") pod \"csi-node-driver-8xnbj\" (UID: \"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0\") " pod="calico-system/csi-node-driver-8xnbj" Feb 12 19:30:40.497105 kubelet[1444]: I0212 19:30:40.497094 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/627c7e44-d6dd-4aec-98a9-5d77abc8e0c0-socket-dir\") pod \"csi-node-driver-8xnbj\" (UID: \"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0\") " pod="calico-system/csi-node-driver-8xnbj" Feb 12 19:30:40.497195 kubelet[1444]: I0212 19:30:40.497184 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/627c7e44-d6dd-4aec-98a9-5d77abc8e0c0-registration-dir\") pod \"csi-node-driver-8xnbj\" (UID: \"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0\") " pod="calico-system/csi-node-driver-8xnbj" Feb 12 19:30:40.497876 kubelet[1444]: I0212 19:30:40.497857 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1c415565-3196-46a4-8eaa-b89c92d322dc-kube-proxy\") pod \"kube-proxy-vrm75\" (UID: \"1c415565-3196-46a4-8eaa-b89c92d322dc\") " pod="kube-system/kube-proxy-vrm75" Feb 12 19:30:40.497989 kubelet[1444]: I0212 19:30:40.497977 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/448b0e5e-efea-4c34-8361-a80abb9d7434-tigera-ca-bundle\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.498075 kubelet[1444]: I0212 19:30:40.498065 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-cni-log-dir\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.498156 kubelet[1444]: I0212 19:30:40.498147 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-flexvol-driver-host\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.498242 kubelet[1444]: I0212 19:30:40.498232 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9nffn\" (UniqueName: \"kubernetes.io/projected/448b0e5e-efea-4c34-8361-a80abb9d7434-kube-api-access-9nffn\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.499357 kubelet[1444]: I0212 19:30:40.498322 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-var-run-calico\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.499357 kubelet[1444]: I0212 19:30:40.498366 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-cni-bin-dir\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.499357 kubelet[1444]: I0212 19:30:40.498390 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-cni-net-dir\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.499357 kubelet[1444]: I0212 19:30:40.498413 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/627c7e44-d6dd-4aec-98a9-5d77abc8e0c0-varrun\") pod \"csi-node-driver-8xnbj\" (UID: \"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0\") " pod="calico-system/csi-node-driver-8xnbj" Feb 12 19:30:40.499357 kubelet[1444]: I0212 19:30:40.498433 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zxxrd\" (UniqueName: \"kubernetes.io/projected/627c7e44-d6dd-4aec-98a9-5d77abc8e0c0-kube-api-access-zxxrd\") pod \"csi-node-driver-8xnbj\" (UID: \"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0\") " pod="calico-system/csi-node-driver-8xnbj" Feb 12 19:30:40.499559 kubelet[1444]: I0212 19:30:40.498457 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1c415565-3196-46a4-8eaa-b89c92d322dc-xtables-lock\") pod \"kube-proxy-vrm75\" (UID: \"1c415565-3196-46a4-8eaa-b89c92d322dc\") " pod="kube-system/kube-proxy-vrm75" Feb 12 19:30:40.499559 kubelet[1444]: I0212 19:30:40.498475 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/448b0e5e-efea-4c34-8361-a80abb9d7434-xtables-lock\") pod \"calico-node-jtbtk\" (UID: \"448b0e5e-efea-4c34-8361-a80abb9d7434\") " pod="calico-system/calico-node-jtbtk" Feb 12 19:30:40.499559 kubelet[1444]: I0212 19:30:40.498500 1444 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:30:40.510039 systemd[1]: Created slice kubepods-besteffort-pod1c415565_3196_46a4_8eaa_b89c92d322dc.slice. Feb 12 19:30:40.599612 kubelet[1444]: E0212 19:30:40.599516 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.599612 kubelet[1444]: W0212 19:30:40.599535 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.599612 kubelet[1444]: E0212 19:30:40.599557 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.600103 kubelet[1444]: E0212 19:30:40.600066 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.600205 kubelet[1444]: W0212 19:30:40.600172 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.600286 kubelet[1444]: E0212 19:30:40.600265 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.600666 kubelet[1444]: E0212 19:30:40.600652 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.600753 kubelet[1444]: W0212 19:30:40.600741 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.600832 kubelet[1444]: E0212 19:30:40.600821 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.601013 kubelet[1444]: E0212 19:30:40.600995 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.601013 kubelet[1444]: W0212 19:30:40.601009 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.601083 kubelet[1444]: E0212 19:30:40.601026 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.601157 kubelet[1444]: E0212 19:30:40.601147 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.601157 kubelet[1444]: W0212 19:30:40.601155 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.601217 kubelet[1444]: E0212 19:30:40.601170 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.601298 kubelet[1444]: E0212 19:30:40.601287 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.601298 kubelet[1444]: W0212 19:30:40.601295 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.601360 kubelet[1444]: E0212 19:30:40.601308 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.601488 kubelet[1444]: E0212 19:30:40.601473 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.601488 kubelet[1444]: W0212 19:30:40.601487 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.601552 kubelet[1444]: E0212 19:30:40.601535 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.601635 kubelet[1444]: E0212 19:30:40.601625 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.601635 kubelet[1444]: W0212 19:30:40.601633 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.601695 kubelet[1444]: E0212 19:30:40.601666 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.601758 kubelet[1444]: E0212 19:30:40.601748 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.601758 kubelet[1444]: W0212 19:30:40.601757 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.601818 kubelet[1444]: E0212 19:30:40.601770 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.601899 kubelet[1444]: E0212 19:30:40.601889 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.601899 kubelet[1444]: W0212 19:30:40.601897 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.601959 kubelet[1444]: E0212 19:30:40.601909 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.602020 kubelet[1444]: E0212 19:30:40.602011 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.602020 kubelet[1444]: W0212 19:30:40.602018 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.602081 kubelet[1444]: E0212 19:30:40.602030 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.602272 kubelet[1444]: E0212 19:30:40.602258 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.602348 kubelet[1444]: W0212 19:30:40.602334 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.602417 kubelet[1444]: E0212 19:30:40.602407 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.602593 kubelet[1444]: E0212 19:30:40.602577 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.602593 kubelet[1444]: W0212 19:30:40.602590 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.602663 kubelet[1444]: E0212 19:30:40.602608 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.602733 kubelet[1444]: E0212 19:30:40.602722 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.602733 kubelet[1444]: W0212 19:30:40.602730 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.602789 kubelet[1444]: E0212 19:30:40.602745 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.602866 kubelet[1444]: E0212 19:30:40.602857 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.602866 kubelet[1444]: W0212 19:30:40.602865 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.602916 kubelet[1444]: E0212 19:30:40.602878 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.603028 kubelet[1444]: E0212 19:30:40.603019 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.603057 kubelet[1444]: W0212 19:30:40.603028 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.603057 kubelet[1444]: E0212 19:30:40.603041 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.603181 kubelet[1444]: E0212 19:30:40.603172 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.603205 kubelet[1444]: W0212 19:30:40.603181 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.603205 kubelet[1444]: E0212 19:30:40.603195 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.603332 kubelet[1444]: E0212 19:30:40.603321 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.603332 kubelet[1444]: W0212 19:30:40.603331 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.603380 kubelet[1444]: E0212 19:30:40.603344 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.603527 kubelet[1444]: E0212 19:30:40.603518 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.603563 kubelet[1444]: W0212 19:30:40.603527 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.603563 kubelet[1444]: E0212 19:30:40.603541 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.603676 kubelet[1444]: E0212 19:30:40.603667 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.603676 kubelet[1444]: W0212 19:30:40.603676 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.603723 kubelet[1444]: E0212 19:30:40.603699 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.603818 kubelet[1444]: E0212 19:30:40.603807 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.603818 kubelet[1444]: W0212 19:30:40.603816 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.603869 kubelet[1444]: E0212 19:30:40.603839 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.603951 kubelet[1444]: E0212 19:30:40.603941 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.603951 kubelet[1444]: W0212 19:30:40.603950 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.603997 kubelet[1444]: E0212 19:30:40.603963 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.604088 kubelet[1444]: E0212 19:30:40.604080 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.604088 kubelet[1444]: W0212 19:30:40.604088 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.604135 kubelet[1444]: E0212 19:30:40.604100 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.604229 kubelet[1444]: E0212 19:30:40.604214 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.604256 kubelet[1444]: W0212 19:30:40.604233 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.604256 kubelet[1444]: E0212 19:30:40.604247 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.604389 kubelet[1444]: E0212 19:30:40.604380 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.604415 kubelet[1444]: W0212 19:30:40.604389 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.604415 kubelet[1444]: E0212 19:30:40.604402 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.604550 kubelet[1444]: E0212 19:30:40.604541 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.604576 kubelet[1444]: W0212 19:30:40.604550 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.604576 kubelet[1444]: E0212 19:30:40.604563 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.604688 kubelet[1444]: E0212 19:30:40.604680 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.604688 kubelet[1444]: W0212 19:30:40.604688 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.604736 kubelet[1444]: E0212 19:30:40.604701 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.604822 kubelet[1444]: E0212 19:30:40.604813 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.604822 kubelet[1444]: W0212 19:30:40.604821 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.604869 kubelet[1444]: E0212 19:30:40.604834 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.604975 kubelet[1444]: E0212 19:30:40.604966 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.604999 kubelet[1444]: W0212 19:30:40.604975 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.605024 kubelet[1444]: E0212 19:30:40.604998 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.605104 kubelet[1444]: E0212 19:30:40.605095 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.605130 kubelet[1444]: W0212 19:30:40.605104 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.605130 kubelet[1444]: E0212 19:30:40.605123 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.605233 kubelet[1444]: E0212 19:30:40.605223 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.605233 kubelet[1444]: W0212 19:30:40.605231 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.605278 kubelet[1444]: E0212 19:30:40.605253 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.605358 kubelet[1444]: E0212 19:30:40.605350 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.605358 kubelet[1444]: W0212 19:30:40.605358 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.605406 kubelet[1444]: E0212 19:30:40.605377 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.605493 kubelet[1444]: E0212 19:30:40.605477 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.605493 kubelet[1444]: W0212 19:30:40.605493 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.605543 kubelet[1444]: E0212 19:30:40.605507 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.605640 kubelet[1444]: E0212 19:30:40.605632 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.605667 kubelet[1444]: W0212 19:30:40.605640 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.605667 kubelet[1444]: E0212 19:30:40.605654 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.605773 kubelet[1444]: E0212 19:30:40.605764 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.605773 kubelet[1444]: W0212 19:30:40.605772 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.605823 kubelet[1444]: E0212 19:30:40.605785 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.605920 kubelet[1444]: E0212 19:30:40.605911 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.605920 kubelet[1444]: W0212 19:30:40.605920 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.605968 kubelet[1444]: E0212 19:30:40.605934 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.606153 kubelet[1444]: E0212 19:30:40.606137 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.606153 kubelet[1444]: W0212 19:30:40.606149 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.606214 kubelet[1444]: E0212 19:30:40.606167 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.606556 kubelet[1444]: E0212 19:30:40.606539 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.606556 kubelet[1444]: W0212 19:30:40.606552 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.606645 kubelet[1444]: E0212 19:30:40.606568 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.606763 kubelet[1444]: E0212 19:30:40.606750 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.606763 kubelet[1444]: W0212 19:30:40.606760 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.606836 kubelet[1444]: E0212 19:30:40.606799 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.606937 kubelet[1444]: E0212 19:30:40.606921 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.606937 kubelet[1444]: W0212 19:30:40.606929 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.606937 kubelet[1444]: E0212 19:30:40.606938 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.607083 kubelet[1444]: E0212 19:30:40.607067 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.607083 kubelet[1444]: W0212 19:30:40.607077 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.607083 kubelet[1444]: E0212 19:30:40.607086 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.607631 kubelet[1444]: E0212 19:30:40.607608 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.607631 kubelet[1444]: W0212 19:30:40.607620 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.607631 kubelet[1444]: E0212 19:30:40.607631 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.613988 kubelet[1444]: E0212 19:30:40.613968 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.613988 kubelet[1444]: W0212 19:30:40.613984 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.614096 kubelet[1444]: E0212 19:30:40.614007 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.614212 kubelet[1444]: E0212 19:30:40.614198 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.614212 kubelet[1444]: W0212 19:30:40.614209 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.614270 kubelet[1444]: E0212 19:30:40.614220 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.616273 kubelet[1444]: E0212 19:30:40.616069 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.616273 kubelet[1444]: W0212 19:30:40.616090 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.616273 kubelet[1444]: E0212 19:30:40.616109 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.618462 kubelet[1444]: E0212 19:30:40.618444 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:40.618589 kubelet[1444]: W0212 19:30:40.618575 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:40.618651 kubelet[1444]: E0212 19:30:40.618642 1444 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:40.808613 kubelet[1444]: E0212 19:30:40.808570 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:40.809325 env[1140]: time="2024-02-12T19:30:40.809249395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jtbtk,Uid:448b0e5e-efea-4c34-8361-a80abb9d7434,Namespace:calico-system,Attempt:0,}" Feb 12 19:30:40.815024 kubelet[1444]: E0212 19:30:40.814999 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:40.815812 env[1140]: time="2024-02-12T19:30:40.815647594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vrm75,Uid:1c415565-3196-46a4-8eaa-b89c92d322dc,Namespace:kube-system,Attempt:0,}" Feb 12 19:30:41.458241 env[1140]: time="2024-02-12T19:30:41.458185958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.459186 env[1140]: time="2024-02-12T19:30:41.459153247Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.467648 env[1140]: time="2024-02-12T19:30:41.467565602Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.468598 env[1140]: time="2024-02-12T19:30:41.468561823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.470020 env[1140]: time="2024-02-12T19:30:41.469992789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.472584 env[1140]: time="2024-02-12T19:30:41.472551143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.474269 kubelet[1444]: E0212 19:30:41.474221 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:41.475154 env[1140]: time="2024-02-12T19:30:41.475125132Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.475925 env[1140]: time="2024-02-12T19:30:41.475883479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.513826 env[1140]: time="2024-02-12T19:30:41.512617741Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:41.513826 env[1140]: time="2024-02-12T19:30:41.512660447Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:41.513826 env[1140]: time="2024-02-12T19:30:41.512670738Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:41.513826 env[1140]: time="2024-02-12T19:30:41.512946886Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7 pid=1549 runtime=io.containerd.runc.v2 Feb 12 19:30:41.514078 env[1140]: time="2024-02-12T19:30:41.514024484Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:41.514078 env[1140]: time="2024-02-12T19:30:41.514059274Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:41.514145 env[1140]: time="2024-02-12T19:30:41.514076927Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:41.514243 env[1140]: time="2024-02-12T19:30:41.514204334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/801d92d6fbc2f5060494d39a72930a9c27e7000eb0949dffad065be37f9c19f3 pid=1551 runtime=io.containerd.runc.v2 Feb 12 19:30:41.537226 systemd[1]: Started cri-containerd-179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7.scope. Feb 12 19:30:41.539943 systemd[1]: Started cri-containerd-801d92d6fbc2f5060494d39a72930a9c27e7000eb0949dffad065be37f9c19f3.scope. Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579235 kernel: kauditd_printk_skb: 416 callbacks suppressed Feb 12 19:30:41.579359 kernel: audit: type=1400 audit(1707766241.573:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579385 kernel: audit: type=1400 audit(1707766241.573:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579401 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:30:41.579416 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:30:41.579429 kernel: audit: type=1400 audit(1707766241.573:562): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579443 kernel: audit: type=1400 audit(1707766241.573:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579461 kernel: audit: type=1400 audit(1707766241.573:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579502 kernel: audit: type=1400 audit(1707766241.573:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579527 kernel: audit: type=1400 audit(1707766241.573:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579545 kernel: audit: type=1400 audit(1707766241.573:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit: BPF prog-id=67 op=LOAD Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1551 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316439326436666263326635303630343934643339613732393330 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1551 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316439326436666263326635303630343934643339613732393330 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit: BPF prog-id=68 op=LOAD Feb 12 19:30:41.573000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.573000 audit: BPF prog-id=69 op=LOAD Feb 12 19:30:41.573000 audit[1570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1551 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316439326436666263326635303630343934643339613732393330 Feb 12 19:30:41.576000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=1549 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396237336331633134346434373164393531623931346564633037 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=1549 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396237336331633134346434373164393531623931346564633037 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.576000 audit: BPF prog-id=71 op=LOAD Feb 12 19:30:41.576000 audit[1568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=1549 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396237336331633134346434373164393531623931346564633037 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.579000 audit: BPF prog-id=72 op=LOAD Feb 12 19:30:41.579000 audit[1568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=1549 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396237336331633134346434373164393531623931346564633037 Feb 12 19:30:41.581000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:30:41.581000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.581000 audit: BPF prog-id=73 op=LOAD Feb 12 19:30:41.581000 audit[1568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=1549 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396237336331633134346434373164393531623931346564633037 Feb 12 19:30:41.576000 audit: BPF prog-id=70 op=LOAD Feb 12 19:30:41.576000 audit[1570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1551 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316439326436666263326635303630343934643339613732393330 Feb 12 19:30:41.590000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:30:41.590000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.590000 audit: BPF prog-id=74 op=LOAD Feb 12 19:30:41.590000 audit[1570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1551 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316439326436666263326635303630343934643339613732393330 Feb 12 19:30:41.605000 env[1140]: time="2024-02-12T19:30:41.604931360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jtbtk,Uid:448b0e5e-efea-4c34-8361-a80abb9d7434,Namespace:calico-system,Attempt:0,} returns sandbox id \"179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7\"" Feb 12 19:30:41.605944 kubelet[1444]: E0212 19:30:41.605919 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:41.606605 env[1140]: time="2024-02-12T19:30:41.606575225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vrm75,Uid:1c415565-3196-46a4-8eaa-b89c92d322dc,Namespace:kube-system,Attempt:0,} returns sandbox id \"801d92d6fbc2f5060494d39a72930a9c27e7000eb0949dffad065be37f9c19f3\"" Feb 12 19:30:41.608072 kubelet[1444]: E0212 19:30:41.608046 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:41.608286 env[1140]: time="2024-02-12T19:30:41.608257640Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:30:41.613051 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2404942198.mount: Deactivated successfully. Feb 12 19:30:42.475312 kubelet[1444]: E0212 19:30:42.475281 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:42.576833 kubelet[1444]: E0212 19:30:42.576775 1444 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8xnbj" podUID=627c7e44-d6dd-4aec-98a9-5d77abc8e0c0 Feb 12 19:30:42.723603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1046841333.mount: Deactivated successfully. Feb 12 19:30:42.802578 env[1140]: time="2024-02-12T19:30:42.802529793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:42.804089 env[1140]: time="2024-02-12T19:30:42.804043944Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:42.806027 env[1140]: time="2024-02-12T19:30:42.805986876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:42.807191 env[1140]: time="2024-02-12T19:30:42.807159356Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:42.807639 env[1140]: time="2024-02-12T19:30:42.807610689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:30:42.808446 env[1140]: time="2024-02-12T19:30:42.808297436Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 19:30:42.809886 env[1140]: time="2024-02-12T19:30:42.809676758Z" level=info msg="CreateContainer within sandbox \"179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:30:42.818669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2527586739.mount: Deactivated successfully. Feb 12 19:30:42.826772 env[1140]: time="2024-02-12T19:30:42.826717243Z" level=info msg="CreateContainer within sandbox \"179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ee5df77ad8136b6cd3bdeeab2cbe4fc82c1e63b9295e570f0dba0f5db71d9178\"" Feb 12 19:30:42.827492 env[1140]: time="2024-02-12T19:30:42.827430545Z" level=info msg="StartContainer for \"ee5df77ad8136b6cd3bdeeab2cbe4fc82c1e63b9295e570f0dba0f5db71d9178\"" Feb 12 19:30:42.849337 systemd[1]: Started cri-containerd-ee5df77ad8136b6cd3bdeeab2cbe4fc82c1e63b9295e570f0dba0f5db71d9178.scope. Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1549 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565356466373761643831333662366364336264656561623263626534 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit: BPF prog-id=75 op=LOAD Feb 12 19:30:42.881000 audit[1625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1549 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565356466373761643831333662366364336264656561623263626534 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit: BPF prog-id=76 op=LOAD Feb 12 19:30:42.881000 audit[1625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1549 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565356466373761643831333662366364336264656561623263626534 Feb 12 19:30:42.881000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:30:42.881000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { perfmon } for pid=1625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit[1625]: AVC avc: denied { bpf } for pid=1625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.881000 audit: BPF prog-id=77 op=LOAD Feb 12 19:30:42.881000 audit[1625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1549 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565356466373761643831333662366364336264656561623263626534 Feb 12 19:30:42.902453 env[1140]: time="2024-02-12T19:30:42.902176712Z" level=info msg="StartContainer for \"ee5df77ad8136b6cd3bdeeab2cbe4fc82c1e63b9295e570f0dba0f5db71d9178\" returns successfully" Feb 12 19:30:42.924353 systemd[1]: cri-containerd-ee5df77ad8136b6cd3bdeeab2cbe4fc82c1e63b9295e570f0dba0f5db71d9178.scope: Deactivated successfully. Feb 12 19:30:42.929000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:30:42.974647 env[1140]: time="2024-02-12T19:30:42.974599637Z" level=info msg="shim disconnected" id=ee5df77ad8136b6cd3bdeeab2cbe4fc82c1e63b9295e570f0dba0f5db71d9178 Feb 12 19:30:42.974647 env[1140]: time="2024-02-12T19:30:42.974644025Z" level=warning msg="cleaning up after shim disconnected" id=ee5df77ad8136b6cd3bdeeab2cbe4fc82c1e63b9295e570f0dba0f5db71d9178 namespace=k8s.io Feb 12 19:30:42.974647 env[1140]: time="2024-02-12T19:30:42.974653022Z" level=info msg="cleaning up dead shim" Feb 12 19:30:42.982631 env[1140]: time="2024-02-12T19:30:42.982591364Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:30:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1664 runtime=io.containerd.runc.v2\n" Feb 12 19:30:43.475779 kubelet[1444]: E0212 19:30:43.475738 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:43.590805 kubelet[1444]: E0212 19:30:43.590772 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:43.638786 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ee5df77ad8136b6cd3bdeeab2cbe4fc82c1e63b9295e570f0dba0f5db71d9178-rootfs.mount: Deactivated successfully. Feb 12 19:30:43.854304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3583996409.mount: Deactivated successfully. Feb 12 19:30:44.245994 env[1140]: time="2024-02-12T19:30:44.245856358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:44.247306 env[1140]: time="2024-02-12T19:30:44.247267634Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:44.248968 env[1140]: time="2024-02-12T19:30:44.248931321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:44.250124 env[1140]: time="2024-02-12T19:30:44.250091616Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:44.250562 env[1140]: time="2024-02-12T19:30:44.250534794Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 12 19:30:44.251152 env[1140]: time="2024-02-12T19:30:44.251129697Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:30:44.252583 env[1140]: time="2024-02-12T19:30:44.252551856Z" level=info msg="CreateContainer within sandbox \"801d92d6fbc2f5060494d39a72930a9c27e7000eb0949dffad065be37f9c19f3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:30:44.262955 env[1140]: time="2024-02-12T19:30:44.262902643Z" level=info msg="CreateContainer within sandbox \"801d92d6fbc2f5060494d39a72930a9c27e7000eb0949dffad065be37f9c19f3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b6f7ee35ec1ada03c8b00eceb39d5c895462a3213bcb5a9823f8c94088bf04ef\"" Feb 12 19:30:44.263624 env[1140]: time="2024-02-12T19:30:44.263553112Z" level=info msg="StartContainer for \"b6f7ee35ec1ada03c8b00eceb39d5c895462a3213bcb5a9823f8c94088bf04ef\"" Feb 12 19:30:44.278760 systemd[1]: Started cri-containerd-b6f7ee35ec1ada03c8b00eceb39d5c895462a3213bcb5a9823f8c94088bf04ef.scope. Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1551 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663765653335656331616461303363386230306563656233396435 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.306000 audit: BPF prog-id=78 op=LOAD Feb 12 19:30:44.306000 audit[1690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1551 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663765653335656331616461303363386230306563656233396435 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.307000 audit: BPF prog-id=79 op=LOAD Feb 12 19:30:44.307000 audit[1690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1551 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663765653335656331616461303363386230306563656233396435 Feb 12 19:30:44.308000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:30:44.308000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:44.308000 audit: BPF prog-id=80 op=LOAD Feb 12 19:30:44.308000 audit[1690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1551 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663765653335656331616461303363386230306563656233396435 Feb 12 19:30:44.323391 env[1140]: time="2024-02-12T19:30:44.323344949Z" level=info msg="StartContainer for \"b6f7ee35ec1ada03c8b00eceb39d5c895462a3213bcb5a9823f8c94088bf04ef\" returns successfully" Feb 12 19:30:44.426000 audit[1740]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.426000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc89e6140 a2=0 a3=ffff871206c0 items=0 ppid=1700 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:30:44.427000 audit[1741]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.427000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7fb89c0 a2=0 a3=ffffa2e566c0 items=0 ppid=1700 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:30:44.430000 audit[1742]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.430000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7a91720 a2=0 a3=ffffa5eeb6c0 items=0 ppid=1700 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:30:44.430000 audit[1744]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.430000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcec29c90 a2=0 a3=ffffb6e186c0 items=0 ppid=1700 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:30:44.431000 audit[1745]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.431000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe79e5cd0 a2=0 a3=ffff902016c0 items=0 ppid=1700 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:30:44.431000 audit[1746]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.431000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd354fc10 a2=0 a3=ffffbbb226c0 items=0 ppid=1700 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:30:44.476668 kubelet[1444]: E0212 19:30:44.476616 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:44.528000 audit[1747]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.528000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc923e580 a2=0 a3=ffffb8e2e6c0 items=0 ppid=1700 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:30:44.530000 audit[1749]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.530000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffff33dac0 a2=0 a3=ffff9799f6c0 items=0 ppid=1700 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:30:44.533000 audit[1752]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.533000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff0e252f0 a2=0 a3=ffff8bc746c0 items=0 ppid=1700 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:30:44.534000 audit[1753]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.534000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb522010 a2=0 a3=ffffa67a86c0 items=0 ppid=1700 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:30:44.536000 audit[1755]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.536000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd2e77cf0 a2=0 a3=ffff9309c6c0 items=0 ppid=1700 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:30:44.537000 audit[1756]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.537000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4b52320 a2=0 a3=ffff9e9386c0 items=0 ppid=1700 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:30:44.539000 audit[1758]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.539000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdac7c320 a2=0 a3=ffffb230c6c0 items=0 ppid=1700 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:30:44.542000 audit[1761]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.542000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff690f600 a2=0 a3=ffff8859f6c0 items=0 ppid=1700 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:30:44.543000 audit[1762]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.543000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda164f00 a2=0 a3=ffff832ec6c0 items=0 ppid=1700 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:30:44.545000 audit[1764]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.545000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe9e791f0 a2=0 a3=ffff841a96c0 items=0 ppid=1700 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:30:44.546000 audit[1765]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.546000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff467900 a2=0 a3=ffffb02686c0 items=0 ppid=1700 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:30:44.548000 audit[1767]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.548000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe550dca0 a2=0 a3=ffff869c46c0 items=0 ppid=1700 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:30:44.551000 audit[1770]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.551000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe345e060 a2=0 a3=ffff874866c0 items=0 ppid=1700 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:30:44.554000 audit[1773]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.554000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc2b02b50 a2=0 a3=ffff902a06c0 items=0 ppid=1700 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:30:44.555000 audit[1774]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.555000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffde36f5f0 a2=0 a3=ffff93d1c6c0 items=0 ppid=1700 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:30:44.576758 kubelet[1444]: E0212 19:30:44.576431 1444 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8xnbj" podUID=627c7e44-d6dd-4aec-98a9-5d77abc8e0c0 Feb 12 19:30:44.557000 audit[1776]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.557000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcb27d6c0 a2=0 a3=ffffa30896c0 items=0 ppid=1700 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:30:44.582000 audit[1781]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.582000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd607fba0 a2=0 a3=ffff853826c0 items=0 ppid=1700 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:30:44.587000 audit[1786]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.587000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd2da930 a2=0 a3=ffffaab126c0 items=0 ppid=1700 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:30:44.589000 audit[1788]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:44.589000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd9acb110 a2=0 a3=ffffaaacd6c0 items=0 ppid=1700 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:30:44.593218 kubelet[1444]: E0212 19:30:44.593188 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:44.603000 audit[1790]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:44.603000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffc85ca5e0 a2=0 a3=ffff8b0e86c0 items=0 ppid=1700 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.603907 kubelet[1444]: I0212 19:30:44.603840 1444 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vrm75" podStartSLOduration=3.961350502 podCreationTimestamp="2024-02-12 19:30:38 +0000 UTC" firstStartedPulling="2024-02-12 19:30:41.608379704 +0000 UTC m=+5.106717870" lastFinishedPulling="2024-02-12 19:30:44.250826606 +0000 UTC m=+7.749164771" observedRunningTime="2024-02-12 19:30:44.60312632 +0000 UTC m=+8.101464446" watchObservedRunningTime="2024-02-12 19:30:44.603797403 +0000 UTC m=+8.102135568" Feb 12 19:30:44.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:44.613000 audit[1790]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:44.613000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffc85ca5e0 a2=0 a3=ffff8b0e86c0 items=0 ppid=1700 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:44.617000 audit[1797]: NETFILTER_CFG table=filter:41 family=2 entries=14 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:44.617000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffc24648f0 a2=0 a3=ffffa0bea6c0 items=0 ppid=1700 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:44.618000 audit[1797]: NETFILTER_CFG table=nat:42 family=2 entries=14 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:44.618000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffc24648f0 a2=0 a3=ffffa0bea6c0 items=0 ppid=1700 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:44.626000 audit[1798]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.626000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc5179310 a2=0 a3=ffff8f10c6c0 items=0 ppid=1700 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:30:44.628000 audit[1800]: NETFILTER_CFG table=filter:44 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.628000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe90dab20 a2=0 a3=ffff9889b6c0 items=0 ppid=1700 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:30:44.636000 audit[1803]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.636000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcb0dbb70 a2=0 a3=ffff84be26c0 items=0 ppid=1700 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:30:44.638000 audit[1804]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.638000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd5f7de0 a2=0 a3=ffffba54e6c0 items=0 ppid=1700 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:30:44.640000 audit[1806]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.640000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9e3c2e0 a2=0 a3=ffffa5e296c0 items=0 ppid=1700 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:30:44.641000 audit[1807]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.641000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeba97d50 a2=0 a3=ffffa65016c0 items=0 ppid=1700 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:30:44.643000 audit[1809]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.643000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc43bee50 a2=0 a3=ffff9024c6c0 items=0 ppid=1700 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:30:44.646000 audit[1812]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.646000 audit[1812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc7f99b90 a2=0 a3=ffffabac56c0 items=0 ppid=1700 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:30:44.647000 audit[1813]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.647000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbe6e650 a2=0 a3=ffffbefda6c0 items=0 ppid=1700 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:30:44.648000 audit[1815]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.648000 audit[1815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed729890 a2=0 a3=ffff992226c0 items=0 ppid=1700 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:30:44.650000 audit[1816]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.650000 audit[1816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcf518930 a2=0 a3=ffff84b056c0 items=0 ppid=1700 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:30:44.652000 audit[1818]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.652000 audit[1818]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc0f38ef0 a2=0 a3=ffff978e16c0 items=0 ppid=1700 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:30:44.655000 audit[1821]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.655000 audit[1821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe7bff80 a2=0 a3=ffff96c0b6c0 items=0 ppid=1700 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:30:44.658000 audit[1824]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.658000 audit[1824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe0069c80 a2=0 a3=ffff82a606c0 items=0 ppid=1700 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:30:44.660000 audit[1825]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.660000 audit[1825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc1f79b40 a2=0 a3=ffffa38ab6c0 items=0 ppid=1700 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:30:44.662000 audit[1827]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.662000 audit[1827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffecaac090 a2=0 a3=ffff8dc9e6c0 items=0 ppid=1700 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:30:44.665000 audit[1830]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.665000 audit[1830]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdb027450 a2=0 a3=ffff8fe056c0 items=0 ppid=1700 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:30:44.666000 audit[1831]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.666000 audit[1831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdef924f0 a2=0 a3=ffff87ba56c0 items=0 ppid=1700 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:30:44.668000 audit[1833]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.668000 audit[1833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd58f68a0 a2=0 a3=ffff9f6a76c0 items=0 ppid=1700 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:30:44.671000 audit[1836]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.671000 audit[1836]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffda0c7f0 a2=0 a3=ffffa4ddc6c0 items=0 ppid=1700 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:30:44.672000 audit[1837]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.672000 audit[1837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca75b860 a2=0 a3=ffffabfcf6c0 items=0 ppid=1700 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:30:44.673000 audit[1839]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:44.673000 audit[1839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc10728e0 a2=0 a3=ffff813d46c0 items=0 ppid=1700 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:30:44.676000 audit[1841]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:30:44.676000 audit[1841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffec1e4b70 a2=0 a3=ffff85b296c0 items=0 ppid=1700 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.676000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:44.677000 audit[1841]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:30:44.677000 audit[1841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffec1e4b70 a2=0 a3=ffff85b296c0 items=0 ppid=1700 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.677000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:45.311190 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4270005324.mount: Deactivated successfully. Feb 12 19:30:45.476891 kubelet[1444]: E0212 19:30:45.476854 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:45.594470 kubelet[1444]: E0212 19:30:45.594371 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:46.477724 kubelet[1444]: E0212 19:30:46.477689 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:46.576956 kubelet[1444]: E0212 19:30:46.576851 1444 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8xnbj" podUID=627c7e44-d6dd-4aec-98a9-5d77abc8e0c0 Feb 12 19:30:47.256163 env[1140]: time="2024-02-12T19:30:47.256113174Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:47.257787 env[1140]: time="2024-02-12T19:30:47.257742654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:47.259321 env[1140]: time="2024-02-12T19:30:47.259285823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:47.260789 env[1140]: time="2024-02-12T19:30:47.260755580Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:47.261068 env[1140]: time="2024-02-12T19:30:47.261038519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:30:47.263175 env[1140]: time="2024-02-12T19:30:47.263136499Z" level=info msg="CreateContainer within sandbox \"179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:30:47.272943 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2796519800.mount: Deactivated successfully. Feb 12 19:30:47.277057 env[1140]: time="2024-02-12T19:30:47.277014350Z" level=info msg="CreateContainer within sandbox \"179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6c1d1d816a4396f7401412fb5a49a32003e2520a625f397eac933c6e926a96b5\"" Feb 12 19:30:47.277967 env[1140]: time="2024-02-12T19:30:47.277940522Z" level=info msg="StartContainer for \"6c1d1d816a4396f7401412fb5a49a32003e2520a625f397eac933c6e926a96b5\"" Feb 12 19:30:47.301375 systemd[1]: Started cri-containerd-6c1d1d816a4396f7401412fb5a49a32003e2520a625f397eac933c6e926a96b5.scope. Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.346012 kernel: kauditd_printk_skb: 354 callbacks suppressed Feb 12 19:30:47.346109 kernel: audit: type=1400 audit(1707766247.343:662): avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.346136 kernel: audit: type=1300 audit(1707766247.343:662): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1549 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:47.343000 audit[1850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1549 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:47.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316431643831366134333936663734303134313266623561343961 Feb 12 19:30:47.351191 kernel: audit: type=1327 audit(1707766247.343:662): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316431643831366134333936663734303134313266623561343961 Feb 12 19:30:47.351243 kernel: audit: type=1400 audit(1707766247.343:663): avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.354649 kernel: audit: type=1400 audit(1707766247.343:663): avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.354688 kernel: audit: type=1400 audit(1707766247.343:663): avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.358369 kernel: audit: type=1400 audit(1707766247.343:663): avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.360515 kernel: audit: type=1400 audit(1707766247.343:663): avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.360572 kernel: audit: type=1400 audit(1707766247.343:663): avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.362272 kernel: audit: type=1400 audit(1707766247.343:663): avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit: BPF prog-id=81 op=LOAD Feb 12 19:30:47.343000 audit[1850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1549 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:47.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316431643831366134333936663734303134313266623561343961 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.343000 audit: BPF prog-id=82 op=LOAD Feb 12 19:30:47.343000 audit[1850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1549 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:47.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316431643831366134333936663734303134313266623561343961 Feb 12 19:30:47.345000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:30:47.345000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:47.345000 audit: BPF prog-id=83 op=LOAD Feb 12 19:30:47.345000 audit[1850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1549 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:47.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316431643831366134333936663734303134313266623561343961 Feb 12 19:30:47.375786 env[1140]: time="2024-02-12T19:30:47.375740649Z" level=info msg="StartContainer for \"6c1d1d816a4396f7401412fb5a49a32003e2520a625f397eac933c6e926a96b5\" returns successfully" Feb 12 19:30:47.478199 kubelet[1444]: E0212 19:30:47.478136 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:47.598433 kubelet[1444]: E0212 19:30:47.598333 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:47.879785 systemd[1]: cri-containerd-6c1d1d816a4396f7401412fb5a49a32003e2520a625f397eac933c6e926a96b5.scope: Deactivated successfully. Feb 12 19:30:47.883000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:30:47.895695 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6c1d1d816a4396f7401412fb5a49a32003e2520a625f397eac933c6e926a96b5-rootfs.mount: Deactivated successfully. Feb 12 19:30:47.951452 kubelet[1444]: I0212 19:30:47.951399 1444 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:30:48.070072 env[1140]: time="2024-02-12T19:30:48.070022583Z" level=info msg="shim disconnected" id=6c1d1d816a4396f7401412fb5a49a32003e2520a625f397eac933c6e926a96b5 Feb 12 19:30:48.070072 env[1140]: time="2024-02-12T19:30:48.070066123Z" level=warning msg="cleaning up after shim disconnected" id=6c1d1d816a4396f7401412fb5a49a32003e2520a625f397eac933c6e926a96b5 namespace=k8s.io Feb 12 19:30:48.070072 env[1140]: time="2024-02-12T19:30:48.070074688Z" level=info msg="cleaning up dead shim" Feb 12 19:30:48.080122 env[1140]: time="2024-02-12T19:30:48.080071629Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:30:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1898 runtime=io.containerd.runc.v2\n" Feb 12 19:30:48.479190 kubelet[1444]: E0212 19:30:48.479106 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:48.582093 systemd[1]: Created slice kubepods-besteffort-pod627c7e44_d6dd_4aec_98a9_5d77abc8e0c0.slice. Feb 12 19:30:48.584713 env[1140]: time="2024-02-12T19:30:48.584669959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8xnbj,Uid:627c7e44-d6dd-4aec-98a9-5d77abc8e0c0,Namespace:calico-system,Attempt:0,}" Feb 12 19:30:48.603042 kubelet[1444]: E0212 19:30:48.602560 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:48.603814 env[1140]: time="2024-02-12T19:30:48.603728200Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:30:48.661127 env[1140]: time="2024-02-12T19:30:48.661043617Z" level=error msg="Failed to destroy network for sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:48.662280 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c-shm.mount: Deactivated successfully. Feb 12 19:30:48.663081 env[1140]: time="2024-02-12T19:30:48.663033254Z" level=error msg="encountered an error cleaning up failed sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:48.663129 env[1140]: time="2024-02-12T19:30:48.663099500Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8xnbj,Uid:627c7e44-d6dd-4aec-98a9-5d77abc8e0c0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:48.663697 kubelet[1444]: E0212 19:30:48.663365 1444 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:48.663697 kubelet[1444]: E0212 19:30:48.663419 1444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8xnbj" Feb 12 19:30:48.663697 kubelet[1444]: E0212 19:30:48.663439 1444 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8xnbj" Feb 12 19:30:48.663830 kubelet[1444]: E0212 19:30:48.663501 1444 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8xnbj_calico-system(627c7e44-d6dd-4aec-98a9-5d77abc8e0c0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8xnbj_calico-system(627c7e44-d6dd-4aec-98a9-5d77abc8e0c0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8xnbj" podUID=627c7e44-d6dd-4aec-98a9-5d77abc8e0c0 Feb 12 19:30:49.480096 kubelet[1444]: E0212 19:30:49.480041 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:49.604745 kubelet[1444]: I0212 19:30:49.604702 1444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Feb 12 19:30:49.605828 env[1140]: time="2024-02-12T19:30:49.605775479Z" level=info msg="StopPodSandbox for \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\"" Feb 12 19:30:49.633978 env[1140]: time="2024-02-12T19:30:49.633903602Z" level=error msg="StopPodSandbox for \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\" failed" error="failed to destroy network for sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:49.634468 kubelet[1444]: E0212 19:30:49.634418 1444 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Feb 12 19:30:49.634560 kubelet[1444]: E0212 19:30:49.634545 1444 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c} Feb 12 19:30:49.634633 kubelet[1444]: E0212 19:30:49.634622 1444 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:30:49.634691 kubelet[1444]: E0212 19:30:49.634663 1444 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8xnbj" podUID=627c7e44-d6dd-4aec-98a9-5d77abc8e0c0 Feb 12 19:30:50.266000 audit[1969]: NETFILTER_CFG table=filter:67 family=2 entries=14 op=nft_register_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:50.266000 audit[1969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd3a09ec0 a2=0 a3=ffffa86886c0 items=0 ppid=1700 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:50.266000 audit[1969]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:50.266000 audit[1969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffd3a09ec0 a2=0 a3=ffffa86886c0 items=0 ppid=1700 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:50.297000 audit[1971]: NETFILTER_CFG table=filter:69 family=2 entries=11 op=nft_register_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:50.297000 audit[1971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe91c3d00 a2=0 a3=ffffbd93d6c0 items=0 ppid=1700 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:50.298000 audit[1971]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:50.298000 audit[1971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffe91c3d00 a2=0 a3=ffffbd93d6c0 items=0 ppid=1700 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:50.481051 kubelet[1444]: E0212 19:30:50.481000 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:50.743176 kubelet[1444]: I0212 19:30:50.742768 1444 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:50.749125 systemd[1]: Created slice kubepods-besteffort-pod72fa6530_1e0b_45f3_9c0f_5a69fbb29109.slice. Feb 12 19:30:50.763532 kubelet[1444]: I0212 19:30:50.763492 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8f5dr\" (UniqueName: \"kubernetes.io/projected/72fa6530-1e0b-45f3-9c0f-5a69fbb29109-kube-api-access-8f5dr\") pod \"nginx-deployment-845c78c8b9-h5wlz\" (UID: \"72fa6530-1e0b-45f3-9c0f-5a69fbb29109\") " pod="default/nginx-deployment-845c78c8b9-h5wlz" Feb 12 19:30:51.052637 env[1140]: time="2024-02-12T19:30:51.052591531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-h5wlz,Uid:72fa6530-1e0b-45f3-9c0f-5a69fbb29109,Namespace:default,Attempt:0,}" Feb 12 19:30:51.177013 env[1140]: time="2024-02-12T19:30:51.176933327Z" level=error msg="Failed to destroy network for sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:51.178296 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82-shm.mount: Deactivated successfully. Feb 12 19:30:51.179191 env[1140]: time="2024-02-12T19:30:51.179140011Z" level=error msg="encountered an error cleaning up failed sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:51.179239 env[1140]: time="2024-02-12T19:30:51.179219351Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-h5wlz,Uid:72fa6530-1e0b-45f3-9c0f-5a69fbb29109,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:51.179495 kubelet[1444]: E0212 19:30:51.179463 1444 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:51.179567 kubelet[1444]: E0212 19:30:51.179535 1444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-h5wlz" Feb 12 19:30:51.179567 kubelet[1444]: E0212 19:30:51.179555 1444 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-h5wlz" Feb 12 19:30:51.179626 kubelet[1444]: E0212 19:30:51.179598 1444 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-h5wlz_default(72fa6530-1e0b-45f3-9c0f-5a69fbb29109)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-h5wlz_default(72fa6530-1e0b-45f3-9c0f-5a69fbb29109)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-h5wlz" podUID=72fa6530-1e0b-45f3-9c0f-5a69fbb29109 Feb 12 19:30:51.323000 audit[2015]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=2015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:51.323000 audit[2015]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc45b3650 a2=0 a3=ffff8b5226c0 items=0 ppid=1700 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:51.343000 audit[2015]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=2015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:51.343000 audit[2015]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffc45b3650 a2=0 a3=ffff8b5226c0 items=0 ppid=1700 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:51.481384 kubelet[1444]: E0212 19:30:51.481326 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:51.608414 kubelet[1444]: I0212 19:30:51.608122 1444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Feb 12 19:30:51.608716 env[1140]: time="2024-02-12T19:30:51.608677561Z" level=info msg="StopPodSandbox for \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\"" Feb 12 19:30:51.633591 env[1140]: time="2024-02-12T19:30:51.633530475Z" level=error msg="StopPodSandbox for \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\" failed" error="failed to destroy network for sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:51.633872 kubelet[1444]: E0212 19:30:51.633833 1444 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Feb 12 19:30:51.633941 kubelet[1444]: E0212 19:30:51.633885 1444 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82} Feb 12 19:30:51.633941 kubelet[1444]: E0212 19:30:51.633925 1444 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"72fa6530-1e0b-45f3-9c0f-5a69fbb29109\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:30:51.634029 kubelet[1444]: E0212 19:30:51.633960 1444 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"72fa6530-1e0b-45f3-9c0f-5a69fbb29109\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-h5wlz" podUID=72fa6530-1e0b-45f3-9c0f-5a69fbb29109 Feb 12 19:30:52.482380 kubelet[1444]: E0212 19:30:52.482330 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:53.303848 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3861402912.mount: Deactivated successfully. Feb 12 19:30:53.482767 kubelet[1444]: E0212 19:30:53.482707 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:53.667346 env[1140]: time="2024-02-12T19:30:53.667011122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:53.668892 env[1140]: time="2024-02-12T19:30:53.668859522Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:53.670988 env[1140]: time="2024-02-12T19:30:53.670948452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:53.675225 env[1140]: time="2024-02-12T19:30:53.675185387Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:53.676508 env[1140]: time="2024-02-12T19:30:53.676454096Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:30:53.686243 env[1140]: time="2024-02-12T19:30:53.686174961Z" level=info msg="CreateContainer within sandbox \"179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:30:53.699305 env[1140]: time="2024-02-12T19:30:53.699247877Z" level=info msg="CreateContainer within sandbox \"179b73c1c144d471d951b914edc0703c4aa0cac12dc8ed91a62cdce2dbd4ddd7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"060db2d600b654b9d71dbf364b61c1240e9b6a756edb91cf452f7e13e13b6bb5\"" Feb 12 19:30:53.700367 env[1140]: time="2024-02-12T19:30:53.700309385Z" level=info msg="StartContainer for \"060db2d600b654b9d71dbf364b61c1240e9b6a756edb91cf452f7e13e13b6bb5\"" Feb 12 19:30:53.715534 systemd[1]: Started cri-containerd-060db2d600b654b9d71dbf364b61c1240e9b6a756edb91cf452f7e13e13b6bb5.scope. Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849975 kernel: kauditd_printk_skb: 52 callbacks suppressed Feb 12 19:30:53.850027 kernel: audit: type=1400 audit(1707766253.848:675): avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1549 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:53.854393 kernel: audit: type=1300 audit(1707766253.848:675): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1549 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:53.854442 kernel: audit: type=1327 audit(1707766253.848:675): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306462326436303062363534623964373164626633363462363163 Feb 12 19:30:53.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306462326436303062363534623964373164626633363462363163 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.858501 kernel: audit: type=1400 audit(1707766253.848:676): avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.858568 kernel: audit: type=1400 audit(1707766253.848:676): avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.861839 kernel: audit: type=1400 audit(1707766253.848:676): avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.863828 kernel: audit: type=1400 audit(1707766253.848:676): avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.865986 kernel: audit: type=1400 audit(1707766253.848:676): avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.866061 kernel: audit: type=1400 audit(1707766253.848:676): avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.869617 kernel: audit: type=1400 audit(1707766253.848:676): avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.848000 audit: BPF prog-id=84 op=LOAD Feb 12 19:30:53.848000 audit[2052]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1549 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:53.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306462326436303062363534623964373164626633363462363163 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.849000 audit: BPF prog-id=85 op=LOAD Feb 12 19:30:53.849000 audit[2052]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1549 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:53.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306462326436303062363534623964373164626633363462363163 Feb 12 19:30:53.851000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:30:53.851000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:53.851000 audit: BPF prog-id=86 op=LOAD Feb 12 19:30:53.851000 audit[2052]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1549 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:53.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306462326436303062363534623964373164626633363462363163 Feb 12 19:30:53.879962 env[1140]: time="2024-02-12T19:30:53.879913252Z" level=info msg="StartContainer for \"060db2d600b654b9d71dbf364b61c1240e9b6a756edb91cf452f7e13e13b6bb5\" returns successfully" Feb 12 19:30:54.017964 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:30:54.018076 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:30:54.483326 kubelet[1444]: E0212 19:30:54.483210 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:54.615600 kubelet[1444]: E0212 19:30:54.615364 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:54.630157 kubelet[1444]: I0212 19:30:54.629851 1444 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-jtbtk" podStartSLOduration=4.560799209 podCreationTimestamp="2024-02-12 19:30:38 +0000 UTC" firstStartedPulling="2024-02-12 19:30:41.607684446 +0000 UTC m=+5.106022612" lastFinishedPulling="2024-02-12 19:30:53.676690675 +0000 UTC m=+17.175028841" observedRunningTime="2024-02-12 19:30:54.62941592 +0000 UTC m=+18.127754086" watchObservedRunningTime="2024-02-12 19:30:54.629805438 +0000 UTC m=+18.128143604" Feb 12 19:30:55.277000 audit[2152]: AVC avc: denied { write } for pid=2152 comm="tee" name="fd" dev="proc" ino=14285 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:55.277000 audit[2152]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf1a1990 a2=241 a3=1b6 items=1 ppid=2127 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.277000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:30:55.277000 audit: PATH item=0 name="/dev/fd/63" inode=14280 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:55.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:55.279000 audit[2150]: AVC avc: denied { write } for pid=2150 comm="tee" name="fd" dev="proc" ino=13118 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:55.279000 audit[2150]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd27df97e a2=241 a3=1b6 items=1 ppid=2117 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.279000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:30:55.279000 audit: PATH item=0 name="/dev/fd/63" inode=13115 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:55.279000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:55.291000 audit[2176]: AVC avc: denied { write } for pid=2176 comm="tee" name="fd" dev="proc" ino=13133 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:55.292000 audit[2168]: AVC avc: denied { write } for pid=2168 comm="tee" name="fd" dev="proc" ino=13134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:55.292000 audit[2168]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdaf9998f a2=241 a3=1b6 items=1 ppid=2135 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.292000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:30:55.292000 audit: PATH item=0 name="/dev/fd/63" inode=14291 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:55.292000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:55.291000 audit[2176]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3b6a98e a2=241 a3=1b6 items=1 ppid=2130 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.291000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:30:55.291000 audit: PATH item=0 name="/dev/fd/63" inode=13127 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:55.291000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:55.299000 audit[2181]: AVC avc: denied { write } for pid=2181 comm="tee" name="fd" dev="proc" ino=13139 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:55.299000 audit[2181]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe20eb98e a2=241 a3=1b6 items=1 ppid=2123 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.299000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:30:55.299000 audit: PATH item=0 name="/dev/fd/63" inode=13130 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:55.299000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:55.301000 audit[2187]: AVC avc: denied { write } for pid=2187 comm="tee" name="fd" dev="proc" ino=14859 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:55.301000 audit[2187]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff775498e a2=241 a3=1b6 items=1 ppid=2124 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.301000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:30:55.301000 audit: PATH item=0 name="/dev/fd/63" inode=14856 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:55.301000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:55.309000 audit[2192]: AVC avc: denied { write } for pid=2192 comm="tee" name="fd" dev="proc" ino=12141 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:55.309000 audit[2192]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec1b797f a2=241 a3=1b6 items=1 ppid=2116 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.309000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:30:55.309000 audit: PATH item=0 name="/dev/fd/63" inode=14861 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:55.309000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:55.410524 kernel: Initializing XFRM netlink socket Feb 12 19:30:55.483952 kubelet[1444]: E0212 19:30:55.483913 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit: BPF prog-id=87 op=LOAD Feb 12 19:30:55.517000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3231858 a2=70 a3=0 items=0 ppid=2131 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.517000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:30:55.517000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit: BPF prog-id=88 op=LOAD Feb 12 19:30:55.517000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3231858 a2=70 a3=4a174c items=0 ppid=2131 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.517000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:30:55.517000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:30:55.517000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.517000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff3231888 a2=70 a3=240ae79f items=0 ppid=2131 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.517000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.518000 audit: BPF prog-id=89 op=LOAD Feb 12 19:30:55.518000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff32317d8 a2=70 a3=240ae7b9 items=0 ppid=2131 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.518000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:30:55.520000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.520000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc8f85528 a2=70 a3=0 items=0 ppid=2131 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.520000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:30:55.520000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.520000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc8f85408 a2=70 a3=2 items=0 ppid=2131 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.520000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:30:55.532000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:30:55.568000 audit[2295]: NETFILTER_CFG table=mangle:73 family=2 entries=19 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:55.568000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffc2384fe0 a2=0 a3=ffffa75b5fa8 items=0 ppid=2131 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.568000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:55.572000 audit[2297]: NETFILTER_CFG table=raw:74 family=2 entries=19 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:55.572000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffff1a36100 a2=0 a3=ffff961cafa8 items=0 ppid=2131 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.572000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:55.574000 audit[2300]: NETFILTER_CFG table=nat:75 family=2 entries=16 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:55.574000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffc5d97410 a2=0 a3=ffff93e9cfa8 items=0 ppid=2131 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.574000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:55.578000 audit[2302]: NETFILTER_CFG table=filter:76 family=2 entries=39 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:55.578000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffe448dcd0 a2=0 a3=ffff9d4fefa8 items=0 ppid=2131 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.578000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:55.617646 kubelet[1444]: I0212 19:30:55.616645 1444 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:30:55.617646 kubelet[1444]: E0212 19:30:55.617436 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:56.419804 systemd-networkd[1045]: vxlan.calico: Link UP Feb 12 19:30:56.419809 systemd-networkd[1045]: vxlan.calico: Gained carrier Feb 12 19:30:56.484791 kubelet[1444]: E0212 19:30:56.484722 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:57.473022 kubelet[1444]: E0212 19:30:57.472972 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:57.485034 kubelet[1444]: E0212 19:30:57.484983 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:57.883026 systemd-networkd[1045]: vxlan.calico: Gained IPv6LL Feb 12 19:30:58.485207 kubelet[1444]: E0212 19:30:58.485145 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:59.295409 kubelet[1444]: I0212 19:30:59.295367 1444 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:30:59.296229 kubelet[1444]: E0212 19:30:59.296200 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:59.311211 systemd[1]: run-containerd-runc-k8s.io-060db2d600b654b9d71dbf364b61c1240e9b6a756edb91cf452f7e13e13b6bb5-runc.GyTqWV.mount: Deactivated successfully. Feb 12 19:30:59.486141 kubelet[1444]: E0212 19:30:59.486096 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:30:59.623798 kubelet[1444]: E0212 19:30:59.623327 1444 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:31:00.307957 systemd[1]: run-containerd-runc-k8s.io-060db2d600b654b9d71dbf364b61c1240e9b6a756edb91cf452f7e13e13b6bb5-runc.fDyhEh.mount: Deactivated successfully. Feb 12 19:31:00.486961 kubelet[1444]: E0212 19:31:00.486919 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:01.487781 kubelet[1444]: E0212 19:31:01.487735 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:02.488713 kubelet[1444]: E0212 19:31:02.488644 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:02.576649 env[1140]: time="2024-02-12T19:31:02.576603481Z" level=info msg="StopPodSandbox for \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\"" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.633 [INFO][2384] k8s.go 578: Cleaning up netns ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.633 [INFO][2384] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" iface="eth0" netns="/var/run/netns/cni-7443a443-1e54-07ee-48f8-a2836e0d30bc" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.633 [INFO][2384] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" iface="eth0" netns="/var/run/netns/cni-7443a443-1e54-07ee-48f8-a2836e0d30bc" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.633 [INFO][2384] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" iface="eth0" netns="/var/run/netns/cni-7443a443-1e54-07ee-48f8-a2836e0d30bc" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.634 [INFO][2384] k8s.go 585: Releasing IP address(es) ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.636 [INFO][2384] utils.go 188: Calico CNI releasing IP address ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.717 [INFO][2392] ipam_plugin.go 415: Releasing address using handleID ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" HandleID="k8s-pod-network.eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Workload="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.717 [INFO][2392] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.717 [INFO][2392] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.733 [WARNING][2392] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" HandleID="k8s-pod-network.eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Workload="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.733 [INFO][2392] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" HandleID="k8s-pod-network.eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Workload="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.735 [INFO][2392] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:02.737362 env[1140]: 2024-02-12 19:31:02.736 [INFO][2384] k8s.go 591: Teardown processing complete. ContainerID="eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c" Feb 12 19:31:02.738859 systemd[1]: run-netns-cni\x2d7443a443\x2d1e54\x2d07ee\x2d48f8\x2da2836e0d30bc.mount: Deactivated successfully. Feb 12 19:31:02.739906 env[1140]: time="2024-02-12T19:31:02.739316848Z" level=info msg="TearDown network for sandbox \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\" successfully" Feb 12 19:31:02.739906 env[1140]: time="2024-02-12T19:31:02.739378929Z" level=info msg="StopPodSandbox for \"eae5791a50e416faf4d023448728326e1752ef84d1ff9ce210008b504e5e063c\" returns successfully" Feb 12 19:31:02.740281 env[1140]: time="2024-02-12T19:31:02.740233042Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8xnbj,Uid:627c7e44-d6dd-4aec-98a9-5d77abc8e0c0,Namespace:calico-system,Attempt:1,}" Feb 12 19:31:02.859525 systemd-networkd[1045]: caliec995552076: Link UP Feb 12 19:31:02.861131 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:31:02.861196 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec995552076: link becomes ready Feb 12 19:31:02.861206 systemd-networkd[1045]: caliec995552076: Gained carrier Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.780 [INFO][2400] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-csi--node--driver--8xnbj-eth0 csi-node-driver- calico-system 627c7e44-d6dd-4aec-98a9-5d77abc8e0c0 949 0 2024-02-12 19:30:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 csi-node-driver-8xnbj eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliec995552076 [] []}} ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Namespace="calico-system" Pod="csi-node-driver-8xnbj" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--8xnbj-" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.780 [INFO][2400] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Namespace="calico-system" Pod="csi-node-driver-8xnbj" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.802 [INFO][2415] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" HandleID="k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Workload="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.824 [INFO][2415] ipam_plugin.go 268: Auto assigning IP ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" HandleID="k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Workload="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000243a80), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.120", "pod":"csi-node-driver-8xnbj", "timestamp":"2024-02-12 19:31:02.802874321 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.825 [INFO][2415] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.825 [INFO][2415] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.825 [INFO][2415] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.827 [INFO][2415] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.831 [INFO][2415] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.838 [INFO][2415] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.840 [INFO][2415] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.842 [INFO][2415] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.842 [INFO][2415] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.844 [INFO][2415] ipam.go 1682: Creating new handle: k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.848 [INFO][2415] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.855 [INFO][2415] ipam.go 1216: Successfully claimed IPs: [192.168.77.65/26] block=192.168.77.64/26 handle="k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.855 [INFO][2415] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.65/26] handle="k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" host="10.0.0.120" Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.855 [INFO][2415] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:02.873777 env[1140]: 2024-02-12 19:31:02.855 [INFO][2415] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.65/26] IPv6=[] ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" HandleID="k8s-pod-network.a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Workload="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.874525 env[1140]: 2024-02-12 19:31:02.857 [INFO][2400] k8s.go 385: Populated endpoint ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Namespace="calico-system" Pod="csi-node-driver-8xnbj" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--8xnbj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"csi-node-driver-8xnbj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliec995552076", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:02.874525 env[1140]: 2024-02-12 19:31:02.857 [INFO][2400] k8s.go 386: Calico CNI using IPs: [192.168.77.65/32] ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Namespace="calico-system" Pod="csi-node-driver-8xnbj" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.874525 env[1140]: 2024-02-12 19:31:02.857 [INFO][2400] dataplane_linux.go 68: Setting the host side veth name to caliec995552076 ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Namespace="calico-system" Pod="csi-node-driver-8xnbj" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.874525 env[1140]: 2024-02-12 19:31:02.861 [INFO][2400] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Namespace="calico-system" Pod="csi-node-driver-8xnbj" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.874525 env[1140]: 2024-02-12 19:31:02.861 [INFO][2400] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Namespace="calico-system" Pod="csi-node-driver-8xnbj" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--8xnbj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"627c7e44-d6dd-4aec-98a9-5d77abc8e0c0", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef", Pod:"csi-node-driver-8xnbj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliec995552076", MAC:"46:84:b4:b8:dc:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:02.874525 env[1140]: 2024-02-12 19:31:02.870 [INFO][2400] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef" Namespace="calico-system" Pod="csi-node-driver-8xnbj" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--8xnbj-eth0" Feb 12 19:31:02.889502 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 12 19:31:02.889594 kernel: audit: type=1325 audit(1707766262.884:701): table=filter:77 family=2 entries=36 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:31:02.889617 kernel: audit: type=1300 audit(1707766262.884:701): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffc6f18ae0 a2=0 a3=ffff8dab3fa8 items=0 ppid=2131 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:02.884000 audit[2439]: NETFILTER_CFG table=filter:77 family=2 entries=36 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:31:02.884000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffc6f18ae0 a2=0 a3=ffff8dab3fa8 items=0 ppid=2131 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:02.890304 env[1140]: time="2024-02-12T19:31:02.889664929Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:31:02.890304 env[1140]: time="2024-02-12T19:31:02.889699828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:31:02.890304 env[1140]: time="2024-02-12T19:31:02.889709582Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:31:02.890304 env[1140]: time="2024-02-12T19:31:02.889803084Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef pid=2447 runtime=io.containerd.runc.v2 Feb 12 19:31:02.884000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:31:02.893119 kernel: audit: type=1327 audit(1707766262.884:701): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:31:02.905845 systemd[1]: Started cri-containerd-a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef.scope. Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.931537 kernel: audit: type=1400 audit(1707766262.926:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.931601 kernel: audit: type=1400 audit(1707766262.926:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.931624 kernel: audit: type=1400 audit(1707766262.926:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.933369 kernel: audit: type=1400 audit(1707766262.926:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.935349 kernel: audit: type=1400 audit(1707766262.926:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.937287 kernel: audit: type=1400 audit(1707766262.926:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.939204 kernel: audit: type=1400 audit(1707766262.926:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.928000 audit: BPF prog-id=90 op=LOAD Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:02.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643034366333366638326262663063353832386161373533363164 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:02.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643034366333366638326262663063353832386161373533363164 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.938000 audit: BPF prog-id=91 op=LOAD Feb 12 19:31:02.938000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:02.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643034366333366638326262663063353832386161373533363164 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit: BPF prog-id=92 op=LOAD Feb 12 19:31:02.940000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:02.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643034366333366638326262663063353832386161373533363164 Feb 12 19:31:02.940000 audit: BPF prog-id=92 op=UNLOAD Feb 12 19:31:02.940000 audit: BPF prog-id=91 op=UNLOAD Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:02.940000 audit: BPF prog-id=93 op=LOAD Feb 12 19:31:02.940000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:02.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643034366333366638326262663063353832386161373533363164 Feb 12 19:31:02.942264 systemd-resolved[1088]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:31:02.954746 env[1140]: time="2024-02-12T19:31:02.954707886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8xnbj,Uid:627c7e44-d6dd-4aec-98a9-5d77abc8e0c0,Namespace:calico-system,Attempt:1,} returns sandbox id \"a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef\"" Feb 12 19:31:02.956449 env[1140]: time="2024-02-12T19:31:02.956419989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:31:03.489027 kubelet[1444]: E0212 19:31:03.488965 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:04.084780 env[1140]: time="2024-02-12T19:31:04.084271127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:04.086832 env[1140]: time="2024-02-12T19:31:04.086799578Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:04.088283 env[1140]: time="2024-02-12T19:31:04.088256216Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:04.089695 env[1140]: time="2024-02-12T19:31:04.089671486Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:04.090108 env[1140]: time="2024-02-12T19:31:04.090081513Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:31:04.091976 env[1140]: time="2024-02-12T19:31:04.091947377Z" level=info msg="CreateContainer within sandbox \"a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:31:04.107543 env[1140]: time="2024-02-12T19:31:04.107457222Z" level=info msg="CreateContainer within sandbox \"a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c0b22dfb3abd0b06a643f4a6da6ebe8577f1f7f2acdc28f545f3c00f91e48650\"" Feb 12 19:31:04.108329 env[1140]: time="2024-02-12T19:31:04.108257712Z" level=info msg="StartContainer for \"c0b22dfb3abd0b06a643f4a6da6ebe8577f1f7f2acdc28f545f3c00f91e48650\"" Feb 12 19:31:04.133273 systemd[1]: Started cri-containerd-c0b22dfb3abd0b06a643f4a6da6ebe8577f1f7f2acdc28f545f3c00f91e48650.scope. Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2447 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623232646662336162643062303661363433663461366461366562 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.150000 audit: BPF prog-id=94 op=LOAD Feb 12 19:31:04.150000 audit[2488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2447 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623232646662336162643062303661363433663461366461366562 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.151000 audit: BPF prog-id=95 op=LOAD Feb 12 19:31:04.151000 audit[2488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2447 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623232646662336162643062303661363433663461366461366562 Feb 12 19:31:04.153000 audit: BPF prog-id=95 op=UNLOAD Feb 12 19:31:04.153000 audit: BPF prog-id=94 op=UNLOAD Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:04.153000 audit: BPF prog-id=96 op=LOAD Feb 12 19:31:04.153000 audit[2488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2447 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623232646662336162643062303661363433663461366461366562 Feb 12 19:31:04.175042 env[1140]: time="2024-02-12T19:31:04.174995699Z" level=info msg="StartContainer for \"c0b22dfb3abd0b06a643f4a6da6ebe8577f1f7f2acdc28f545f3c00f91e48650\" returns successfully" Feb 12 19:31:04.176415 env[1140]: time="2024-02-12T19:31:04.176377884Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:31:04.458000 audit[2515]: NETFILTER_CFG table=filter:78 family=2 entries=9 op=nft_register_rule pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:04.458000 audit[2515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe3e340c0 a2=0 a3=ffff93fa56c0 items=0 ppid=1700 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:04.491541 kubelet[1444]: E0212 19:31:04.490002 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:04.496191 kubelet[1444]: I0212 19:31:04.496160 1444 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:31:04.459000 audit[2515]: NETFILTER_CFG table=nat:79 family=2 entries=20 op=nft_register_rule pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:04.459000 audit[2515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe3e340c0 a2=0 a3=ffff93fa56c0 items=0 ppid=1700 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:04.505000 audit[2517]: NETFILTER_CFG table=filter:80 family=2 entries=10 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:04.505000 audit[2517]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc8815f30 a2=0 a3=ffffbb5bc6c0 items=0 ppid=1700 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:04.508248 systemd[1]: Created slice kubepods-besteffort-podd1426223_ab18_4ed9_b771_2f189d49a47c.slice. Feb 12 19:31:04.506000 audit[2517]: NETFILTER_CFG table=nat:81 family=2 entries=20 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:04.506000 audit[2517]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc8815f30 a2=0 a3=ffffbb5bc6c0 items=0 ppid=1700 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:04.551269 kubelet[1444]: I0212 19:31:04.551137 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d1426223-ab18-4ed9-b771-2f189d49a47c-calico-apiserver-certs\") pod \"calico-apiserver-6947dd49d9-v4hxx\" (UID: \"d1426223-ab18-4ed9-b771-2f189d49a47c\") " pod="calico-apiserver/calico-apiserver-6947dd49d9-v4hxx" Feb 12 19:31:04.551269 kubelet[1444]: I0212 19:31:04.551184 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l6j8q\" (UniqueName: \"kubernetes.io/projected/d1426223-ab18-4ed9-b771-2f189d49a47c-kube-api-access-l6j8q\") pod \"calico-apiserver-6947dd49d9-v4hxx\" (UID: \"d1426223-ab18-4ed9-b771-2f189d49a47c\") " pod="calico-apiserver/calico-apiserver-6947dd49d9-v4hxx" Feb 12 19:31:04.813121 env[1140]: time="2024-02-12T19:31:04.813080396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6947dd49d9-v4hxx,Uid:d1426223-ab18-4ed9-b771-2f189d49a47c,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:31:04.924302 systemd-networkd[1045]: caliec995552076: Gained IPv6LL Feb 12 19:31:04.944207 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:31:04.944310 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0851034a560: link becomes ready Feb 12 19:31:04.944930 systemd-networkd[1045]: cali0851034a560: Link UP Feb 12 19:31:04.945060 systemd-networkd[1045]: cali0851034a560: Gained carrier Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.861 [INFO][2520] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0 calico-apiserver-6947dd49d9- calico-apiserver d1426223-ab18-4ed9-b771-2f189d49a47c 1006 0 2024-02-12 19:31:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6947dd49d9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.120 calico-apiserver-6947dd49d9-v4hxx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0851034a560 [] []}} ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-v4hxx" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.861 [INFO][2520] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-v4hxx" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.888 [INFO][2533] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" HandleID="k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Workload="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.908 [INFO][2533] ipam_plugin.go 268: Auto assigning IP ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" HandleID="k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Workload="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c380), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.120", "pod":"calico-apiserver-6947dd49d9-v4hxx", "timestamp":"2024-02-12 19:31:04.88889054 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.909 [INFO][2533] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.909 [INFO][2533] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.909 [INFO][2533] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.911 [INFO][2533] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.915 [INFO][2533] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.919 [INFO][2533] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.921 [INFO][2533] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.923 [INFO][2533] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.924 [INFO][2533] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.926 [INFO][2533] ipam.go 1682: Creating new handle: k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16 Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.929 [INFO][2533] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.933 [INFO][2533] ipam.go 1216: Successfully claimed IPs: [192.168.77.66/26] block=192.168.77.64/26 handle="k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.933 [INFO][2533] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.66/26] handle="k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" host="10.0.0.120" Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.933 [INFO][2533] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:04.967091 env[1140]: 2024-02-12 19:31:04.933 [INFO][2533] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.66/26] IPv6=[] ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" HandleID="k8s-pod-network.80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Workload="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" Feb 12 19:31:04.967810 env[1140]: 2024-02-12 19:31:04.935 [INFO][2520] k8s.go 385: Populated endpoint ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-v4hxx" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0", GenerateName:"calico-apiserver-6947dd49d9-", Namespace:"calico-apiserver", SelfLink:"", UID:"d1426223-ab18-4ed9-b771-2f189d49a47c", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 31, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6947dd49d9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"calico-apiserver-6947dd49d9-v4hxx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0851034a560", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:04.967810 env[1140]: 2024-02-12 19:31:04.935 [INFO][2520] k8s.go 386: Calico CNI using IPs: [192.168.77.66/32] ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-v4hxx" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" Feb 12 19:31:04.967810 env[1140]: 2024-02-12 19:31:04.935 [INFO][2520] dataplane_linux.go 68: Setting the host side veth name to cali0851034a560 ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-v4hxx" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" Feb 12 19:31:04.967810 env[1140]: 2024-02-12 19:31:04.941 [INFO][2520] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-v4hxx" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" Feb 12 19:31:04.967810 env[1140]: 2024-02-12 19:31:04.941 [INFO][2520] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-v4hxx" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0", GenerateName:"calico-apiserver-6947dd49d9-", Namespace:"calico-apiserver", SelfLink:"", UID:"d1426223-ab18-4ed9-b771-2f189d49a47c", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 31, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6947dd49d9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16", Pod:"calico-apiserver-6947dd49d9-v4hxx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0851034a560", MAC:"ca:c8:aa:6c:20:1f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:04.967810 env[1140]: 2024-02-12 19:31:04.952 [INFO][2520] k8s.go 491: Wrote updated endpoint to datastore ContainerID="80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-v4hxx" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--6947dd49d9--v4hxx-eth0" Feb 12 19:31:04.980000 audit[2559]: NETFILTER_CFG table=filter:82 family=2 entries=47 op=nft_register_chain pid=2559 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:31:04.980000 audit[2559]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25728 a0=3 a1=ffffcc9df7d0 a2=0 a3=ffffa606cfa8 items=0 ppid=2131 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.980000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:31:04.985932 env[1140]: time="2024-02-12T19:31:04.985721467Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:31:04.985932 env[1140]: time="2024-02-12T19:31:04.985766874Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:31:04.985932 env[1140]: time="2024-02-12T19:31:04.985778116Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:31:04.985932 env[1140]: time="2024-02-12T19:31:04.985898175Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16 pid=2568 runtime=io.containerd.runc.v2 Feb 12 19:31:04.999826 systemd[1]: Started cri-containerd-80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16.scope. Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.022000 audit: BPF prog-id=97 op=LOAD Feb 12 19:31:05.023000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.023000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383938643132643835353762616164363662366130373062336136 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383938643132643835353762616164363662366130373062336136 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit: BPF prog-id=98 op=LOAD Feb 12 19:31:05.024000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383938643132643835353762616164363662366130373062336136 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.024000 audit: BPF prog-id=99 op=LOAD Feb 12 19:31:05.024000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383938643132643835353762616164363662366130373062336136 Feb 12 19:31:05.025000 audit: BPF prog-id=99 op=UNLOAD Feb 12 19:31:05.025000 audit: BPF prog-id=98 op=UNLOAD Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.026000 audit: BPF prog-id=100 op=LOAD Feb 12 19:31:05.026000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383938643132643835353762616164363662366130373062336136 Feb 12 19:31:05.029338 systemd-resolved[1088]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:31:05.048260 env[1140]: time="2024-02-12T19:31:05.048212062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6947dd49d9-v4hxx,Uid:d1426223-ab18-4ed9-b771-2f189d49a47c,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16\"" Feb 12 19:31:05.449837 env[1140]: time="2024-02-12T19:31:05.449793525Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:05.452323 env[1140]: time="2024-02-12T19:31:05.452251383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:05.453887 env[1140]: time="2024-02-12T19:31:05.453832306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:05.455292 env[1140]: time="2024-02-12T19:31:05.455223360Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:05.455599 env[1140]: time="2024-02-12T19:31:05.455558772Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:31:05.456221 env[1140]: time="2024-02-12T19:31:05.456188989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:31:05.457930 env[1140]: time="2024-02-12T19:31:05.457848844Z" level=info msg="CreateContainer within sandbox \"a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:31:05.477469 env[1140]: time="2024-02-12T19:31:05.477332322Z" level=info msg="CreateContainer within sandbox \"a2d046c36f82bbf0c5828aa75361dc608819ee763d85a191089eadab3faaaaef\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e58f6d5356f21a1274a12a077370576f8deb96690fdcc48d9ae49cc21c2f16e0\"" Feb 12 19:31:05.478002 env[1140]: time="2024-02-12T19:31:05.477966819Z" level=info msg="StartContainer for \"e58f6d5356f21a1274a12a077370576f8deb96690fdcc48d9ae49cc21c2f16e0\"" Feb 12 19:31:05.490955 kubelet[1444]: E0212 19:31:05.490923 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:05.506375 systemd[1]: Started cri-containerd-e58f6d5356f21a1274a12a077370576f8deb96690fdcc48d9ae49cc21c2f16e0.scope. Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2447 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386636643533353666323161313237346131326130373733373035 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit: BPF prog-id=101 op=LOAD Feb 12 19:31:05.555000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2447 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386636643533353666323161313237346131326130373733373035 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit: BPF prog-id=102 op=LOAD Feb 12 19:31:05.555000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2447 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386636643533353666323161313237346131326130373733373035 Feb 12 19:31:05.555000 audit: BPF prog-id=102 op=UNLOAD Feb 12 19:31:05.555000 audit: BPF prog-id=101 op=UNLOAD Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.555000 audit: BPF prog-id=103 op=LOAD Feb 12 19:31:05.555000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2447 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386636643533353666323161313237346131326130373733373035 Feb 12 19:31:05.585302 env[1140]: time="2024-02-12T19:31:05.584653313Z" level=info msg="StartContainer for \"e58f6d5356f21a1274a12a077370576f8deb96690fdcc48d9ae49cc21c2f16e0\" returns successfully" Feb 12 19:31:05.653223 kubelet[1444]: I0212 19:31:05.653184 1444 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-8xnbj" podStartSLOduration=25.15304483 podCreationTimestamp="2024-02-12 19:30:38 +0000 UTC" firstStartedPulling="2024-02-12 19:31:02.955965669 +0000 UTC m=+26.454303835" lastFinishedPulling="2024-02-12 19:31:05.45606805 +0000 UTC m=+28.954406256" observedRunningTime="2024-02-12 19:31:05.652161579 +0000 UTC m=+29.150499745" watchObservedRunningTime="2024-02-12 19:31:05.653147251 +0000 UTC m=+29.151485497" Feb 12 19:31:06.266673 systemd-networkd[1045]: cali0851034a560: Gained IPv6LL Feb 12 19:31:06.491281 kubelet[1444]: E0212 19:31:06.491230 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:06.550840 kubelet[1444]: I0212 19:31:06.550702 1444 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:31:06.550840 kubelet[1444]: I0212 19:31:06.550734 1444 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:31:06.578364 env[1140]: time="2024-02-12T19:31:06.578316205Z" level=info msg="StopPodSandbox for \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\"" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.639 [INFO][2666] k8s.go 578: Cleaning up netns ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.639 [INFO][2666] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" iface="eth0" netns="/var/run/netns/cni-2eb12189-dd35-813b-e4f9-153c3ae7813f" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.639 [INFO][2666] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" iface="eth0" netns="/var/run/netns/cni-2eb12189-dd35-813b-e4f9-153c3ae7813f" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.639 [INFO][2666] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" iface="eth0" netns="/var/run/netns/cni-2eb12189-dd35-813b-e4f9-153c3ae7813f" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.640 [INFO][2666] k8s.go 585: Releasing IP address(es) ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.640 [INFO][2666] utils.go 188: Calico CNI releasing IP address ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.666 [INFO][2674] ipam_plugin.go 415: Releasing address using handleID ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" HandleID="k8s-pod-network.5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Workload="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.666 [INFO][2674] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.666 [INFO][2674] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.676 [WARNING][2674] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" HandleID="k8s-pod-network.5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Workload="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.676 [INFO][2674] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" HandleID="k8s-pod-network.5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Workload="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.678 [INFO][2674] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.681307 env[1140]: 2024-02-12 19:31:06.679 [INFO][2666] k8s.go 591: Teardown processing complete. ContainerID="5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82" Feb 12 19:31:06.683603 env[1140]: time="2024-02-12T19:31:06.683406248Z" level=info msg="TearDown network for sandbox \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\" successfully" Feb 12 19:31:06.683603 env[1140]: time="2024-02-12T19:31:06.683470298Z" level=info msg="StopPodSandbox for \"5f725c45c20858656a4132dc5cd9590ea2d0119ff1bf7ca1483a23579b484a82\" returns successfully" Feb 12 19:31:06.682740 systemd[1]: run-netns-cni\x2d2eb12189\x2ddd35\x2d813b\x2de4f9\x2d153c3ae7813f.mount: Deactivated successfully. Feb 12 19:31:06.684184 env[1140]: time="2024-02-12T19:31:06.684145996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-h5wlz,Uid:72fa6530-1e0b-45f3-9c0f-5a69fbb29109,Namespace:default,Attempt:1,}" Feb 12 19:31:06.812795 systemd-networkd[1045]: cali87487bf837d: Link UP Feb 12 19:31:06.814949 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:31:06.815060 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali87487bf837d: link becomes ready Feb 12 19:31:06.815178 systemd-networkd[1045]: cali87487bf837d: Gained carrier Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.726 [INFO][2681] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0 nginx-deployment-845c78c8b9- default 72fa6530-1e0b-45f3-9c0f-5a69fbb29109 1029 0 2024-02-12 19:30:50 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 nginx-deployment-845c78c8b9-h5wlz eth0 default [] [] [kns.default ksa.default.default] cali87487bf837d [] []}} ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Namespace="default" Pod="nginx-deployment-845c78c8b9-h5wlz" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.726 [INFO][2681] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Namespace="default" Pod="nginx-deployment-845c78c8b9-h5wlz" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.747 [INFO][2695] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" HandleID="k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Workload="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.760 [INFO][2695] ipam_plugin.go 268: Auto assigning IP ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" HandleID="k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Workload="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400023f890), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"nginx-deployment-845c78c8b9-h5wlz", "timestamp":"2024-02-12 19:31:06.747200086 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.760 [INFO][2695] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.761 [INFO][2695] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.761 [INFO][2695] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.768 [INFO][2695] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.772 [INFO][2695] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.781 [INFO][2695] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.783 [INFO][2695] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.794 [INFO][2695] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.794 [INFO][2695] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.797 [INFO][2695] ipam.go 1682: Creating new handle: k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.801 [INFO][2695] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.807 [INFO][2695] ipam.go 1216: Successfully claimed IPs: [192.168.77.67/26] block=192.168.77.64/26 handle="k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.807 [INFO][2695] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.67/26] handle="k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" host="10.0.0.120" Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.807 [INFO][2695] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.825936 env[1140]: 2024-02-12 19:31:06.807 [INFO][2695] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.67/26] IPv6=[] ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" HandleID="k8s-pod-network.74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Workload="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.826453 env[1140]: 2024-02-12 19:31:06.811 [INFO][2681] k8s.go 385: Populated endpoint ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Namespace="default" Pod="nginx-deployment-845c78c8b9-h5wlz" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"72fa6530-1e0b-45f3-9c0f-5a69fbb29109", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-h5wlz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali87487bf837d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.826453 env[1140]: 2024-02-12 19:31:06.811 [INFO][2681] k8s.go 386: Calico CNI using IPs: [192.168.77.67/32] ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Namespace="default" Pod="nginx-deployment-845c78c8b9-h5wlz" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.826453 env[1140]: 2024-02-12 19:31:06.811 [INFO][2681] dataplane_linux.go 68: Setting the host side veth name to cali87487bf837d ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Namespace="default" Pod="nginx-deployment-845c78c8b9-h5wlz" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.826453 env[1140]: 2024-02-12 19:31:06.815 [INFO][2681] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Namespace="default" Pod="nginx-deployment-845c78c8b9-h5wlz" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.826453 env[1140]: 2024-02-12 19:31:06.815 [INFO][2681] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Namespace="default" Pod="nginx-deployment-845c78c8b9-h5wlz" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"72fa6530-1e0b-45f3-9c0f-5a69fbb29109", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b", Pod:"nginx-deployment-845c78c8b9-h5wlz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali87487bf837d", MAC:"ea:93:db:69:68:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.826453 env[1140]: 2024-02-12 19:31:06.821 [INFO][2681] k8s.go 491: Wrote updated endpoint to datastore ContainerID="74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b" Namespace="default" Pod="nginx-deployment-845c78c8b9-h5wlz" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--845c78c8b9--h5wlz-eth0" Feb 12 19:31:06.838000 audit[2719]: NETFILTER_CFG table=filter:83 family=2 entries=44 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:31:06.838000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22252 a0=3 a1=ffffdc3f8700 a2=0 a3=ffff86242fa8 items=0 ppid=2131 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:06.838000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:31:06.854258 env[1140]: time="2024-02-12T19:31:06.854194806Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:31:06.854413 env[1140]: time="2024-02-12T19:31:06.854232372Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:31:06.854413 env[1140]: time="2024-02-12T19:31:06.854242693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:31:06.854502 env[1140]: time="2024-02-12T19:31:06.854468406Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b pid=2728 runtime=io.containerd.runc.v2 Feb 12 19:31:06.864578 systemd[1]: Started cri-containerd-74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b.scope. Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.894000 audit: BPF prog-id=104 op=LOAD Feb 12 19:31:06.895000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.895000 audit[2738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2728 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:06.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646164343364366663376265346166383732356563393238613465 Feb 12 19:31:06.895000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.895000 audit[2738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2728 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:06.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646164343364366663376265346166383732356563393238613465 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit: BPF prog-id=105 op=LOAD Feb 12 19:31:06.896000 audit[2738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2728 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:06.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646164343364366663376265346166383732356563393238613465 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.896000 audit: BPF prog-id=106 op=LOAD Feb 12 19:31:06.896000 audit[2738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2728 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:06.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646164343364366663376265346166383732356563393238613465 Feb 12 19:31:06.897000 audit: BPF prog-id=106 op=UNLOAD Feb 12 19:31:06.897000 audit: BPF prog-id=105 op=UNLOAD Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:06.897000 audit: BPF prog-id=107 op=LOAD Feb 12 19:31:06.897000 audit[2738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2728 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:06.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646164343364366663376265346166383732356563393238613465 Feb 12 19:31:06.899189 systemd-resolved[1088]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:31:06.932545 env[1140]: time="2024-02-12T19:31:06.932501715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-h5wlz,Uid:72fa6530-1e0b-45f3-9c0f-5a69fbb29109,Namespace:default,Attempt:1,} returns sandbox id \"74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b\"" Feb 12 19:31:07.491850 kubelet[1444]: E0212 19:31:07.491818 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:07.769305 env[1140]: time="2024-02-12T19:31:07.769210732Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:07.771419 env[1140]: time="2024-02-12T19:31:07.771369429Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:07.773462 env[1140]: time="2024-02-12T19:31:07.773431313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:07.775692 env[1140]: time="2024-02-12T19:31:07.775656739Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:07.776331 env[1140]: time="2024-02-12T19:31:07.776292146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:31:07.776995 env[1140]: time="2024-02-12T19:31:07.776880227Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:31:07.778926 env[1140]: time="2024-02-12T19:31:07.778872741Z" level=info msg="CreateContainer within sandbox \"80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:31:07.790545 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1360269206.mount: Deactivated successfully. Feb 12 19:31:07.794015 env[1140]: time="2024-02-12T19:31:07.793959256Z" level=info msg="CreateContainer within sandbox \"80898d12d8557baad66b6a070b3a6b3f3322ddfda124f38106ef9666e1c90d16\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"eec3c7f5e5db1c7f61b0f81eed79117c9cd505d7ac1a99573ceacf6b010db792\"" Feb 12 19:31:07.795164 env[1140]: time="2024-02-12T19:31:07.795131858Z" level=info msg="StartContainer for \"eec3c7f5e5db1c7f61b0f81eed79117c9cd505d7ac1a99573ceacf6b010db792\"" Feb 12 19:31:07.817259 systemd[1]: Started cri-containerd-eec3c7f5e5db1c7f61b0f81eed79117c9cd505d7ac1a99573ceacf6b010db792.scope. Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.875000 audit: BPF prog-id=108 op=LOAD Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2568 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633363376635653564623163376636316230663831656564373931 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2568 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633363376635653564623163376636316230663831656564373931 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit: BPF prog-id=109 op=LOAD Feb 12 19:31:07.876000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2568 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633363376635653564623163376636316230663831656564373931 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit: BPF prog-id=110 op=LOAD Feb 12 19:31:07.876000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2568 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633363376635653564623163376636316230663831656564373931 Feb 12 19:31:07.876000 audit: BPF prog-id=110 op=UNLOAD Feb 12 19:31:07.876000 audit: BPF prog-id=109 op=UNLOAD Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.876000 audit: BPF prog-id=111 op=LOAD Feb 12 19:31:07.876000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2568 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633363376635653564623163376636316230663831656564373931 Feb 12 19:31:07.896779 env[1140]: time="2024-02-12T19:31:07.896720390Z" level=info msg="StartContainer for \"eec3c7f5e5db1c7f61b0f81eed79117c9cd505d7ac1a99573ceacf6b010db792\" returns successfully" Feb 12 19:31:08.058610 systemd-networkd[1045]: cali87487bf837d: Gained IPv6LL Feb 12 19:31:08.299000 audit[2801]: NETFILTER_CFG table=filter:84 family=2 entries=10 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.300754 kernel: kauditd_printk_skb: 325 callbacks suppressed Feb 12 19:31:08.300818 kernel: audit: type=1325 audit(1707766268.299:792): table=filter:84 family=2 entries=10 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.299000 audit[2801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff6dae630 a2=0 a3=ffffb2e516c0 items=0 ppid=1700 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.304773 kernel: audit: type=1300 audit(1707766268.299:792): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff6dae630 a2=0 a3=ffffb2e516c0 items=0 ppid=1700 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.304811 kernel: audit: type=1327 audit(1707766268.299:792): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.300000 audit[2801]: NETFILTER_CFG table=nat:85 family=2 entries=20 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.300000 audit[2801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff6dae630 a2=0 a3=ffffb2e516c0 items=0 ppid=1700 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.316260 kernel: audit: type=1325 audit(1707766268.300:793): table=nat:85 family=2 entries=20 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.316301 kernel: audit: type=1300 audit(1707766268.300:793): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff6dae630 a2=0 a3=ffffb2e516c0 items=0 ppid=1700 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.316322 kernel: audit: type=1327 audit(1707766268.300:793): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.492423 kubelet[1444]: E0212 19:31:08.492369 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:08.666997 kubelet[1444]: I0212 19:31:08.666858 1444 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6947dd49d9-v4hxx" podStartSLOduration=1.939526623 podCreationTimestamp="2024-02-12 19:31:04 +0000 UTC" firstStartedPulling="2024-02-12 19:31:05.049319153 +0000 UTC m=+28.547657319" lastFinishedPulling="2024-02-12 19:31:07.77661215 +0000 UTC m=+31.274950316" observedRunningTime="2024-02-12 19:31:08.666420488 +0000 UTC m=+32.164758654" watchObservedRunningTime="2024-02-12 19:31:08.66681962 +0000 UTC m=+32.165157786" Feb 12 19:31:08.677000 audit[2803]: NETFILTER_CFG table=filter:86 family=2 entries=10 op=nft_register_rule pid=2803 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.677000 audit[2803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe4c2f2a0 a2=0 a3=ffff940896c0 items=0 ppid=1700 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.682601 kernel: audit: type=1325 audit(1707766268.677:794): table=filter:86 family=2 entries=10 op=nft_register_rule pid=2803 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.682670 kernel: audit: type=1300 audit(1707766268.677:794): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe4c2f2a0 a2=0 a3=ffff940896c0 items=0 ppid=1700 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.682698 kernel: audit: type=1327 audit(1707766268.677:794): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.687185 kernel: audit: type=1325 audit(1707766268.678:795): table=nat:87 family=2 entries=20 op=nft_register_rule pid=2803 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.678000 audit[2803]: NETFILTER_CFG table=nat:87 family=2 entries=20 op=nft_register_rule pid=2803 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.678000 audit[2803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe4c2f2a0 a2=0 a3=ffff940896c0 items=0 ppid=1700 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:09.177000 audit[2780]: AVC avc: denied { watch } for pid=2780 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_31_04.2830223929/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c232,c899 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c232,c899 tclass=file permissive=0 Feb 12 19:31:09.177000 audit[2780]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b70380 a2=fc6 a3=0 items=0 ppid=2568 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c232,c899 key=(null) Feb 12 19:31:09.177000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:31:09.492780 kubelet[1444]: E0212 19:31:09.492678 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:09.657692 kubelet[1444]: I0212 19:31:09.657653 1444 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:31:10.492829 kubelet[1444]: E0212 19:31:10.492779 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:10.781979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3357904057.mount: Deactivated successfully. Feb 12 19:31:11.493726 kubelet[1444]: E0212 19:31:11.493668 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:11.548253 env[1140]: time="2024-02-12T19:31:11.548206465Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:11.549500 env[1140]: time="2024-02-12T19:31:11.549452123Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:11.551689 env[1140]: time="2024-02-12T19:31:11.551663567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:11.553859 env[1140]: time="2024-02-12T19:31:11.553822446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:11.554203 env[1140]: time="2024-02-12T19:31:11.554162284Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 12 19:31:11.556523 env[1140]: time="2024-02-12T19:31:11.556467379Z" level=info msg="CreateContainer within sandbox \"74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 19:31:11.571274 env[1140]: time="2024-02-12T19:31:11.571217450Z" level=info msg="CreateContainer within sandbox \"74dad43d6fc7be4af8725ec928a4ea10de39194fae26440fbce3289e4114f93b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"ce69d5b35639cb635db13cfebacdd26b099c11b6e4393c8e51d5e5375ea6013d\"" Feb 12 19:31:11.571995 env[1140]: time="2024-02-12T19:31:11.571967253Z" level=info msg="StartContainer for \"ce69d5b35639cb635db13cfebacdd26b099c11b6e4393c8e51d5e5375ea6013d\"" Feb 12 19:31:11.591871 systemd[1]: Started cri-containerd-ce69d5b35639cb635db13cfebacdd26b099c11b6e4393c8e51d5e5375ea6013d.scope. Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.617000 audit: BPF prog-id=112 op=LOAD Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2728 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:11.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363964356233353633396362363335646231336366656261636464 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2728 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:11.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363964356233353633396362363335646231336366656261636464 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit: BPF prog-id=113 op=LOAD Feb 12 19:31:11.618000 audit[2812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2728 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:11.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363964356233353633396362363335646231336366656261636464 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit: BPF prog-id=114 op=LOAD Feb 12 19:31:11.618000 audit[2812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2728 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:11.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363964356233353633396362363335646231336366656261636464 Feb 12 19:31:11.618000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:31:11.618000 audit: BPF prog-id=113 op=UNLOAD Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:11.618000 audit: BPF prog-id=115 op=LOAD Feb 12 19:31:11.618000 audit[2812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2728 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:11.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363964356233353633396362363335646231336366656261636464 Feb 12 19:31:11.640159 env[1140]: time="2024-02-12T19:31:11.640099109Z" level=info msg="StartContainer for \"ce69d5b35639cb635db13cfebacdd26b099c11b6e4393c8e51d5e5375ea6013d\" returns successfully" Feb 12 19:31:12.494235 kubelet[1444]: E0212 19:31:12.494192 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:13.147000 audit[2866]: NETFILTER_CFG table=filter:88 family=2 entries=22 op=nft_register_rule pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:13.147000 audit[2866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=fffffaa90220 a2=0 a3=ffffbcf4d6c0 items=0 ppid=1700 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:13.149000 audit[2866]: NETFILTER_CFG table=nat:89 family=2 entries=20 op=nft_register_rule pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:13.149000 audit[2866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffffaa90220 a2=0 a3=ffffbcf4d6c0 items=0 ppid=1700 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:13.165000 audit[2868]: NETFILTER_CFG table=filter:90 family=2 entries=34 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:13.165000 audit[2868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffed0aa370 a2=0 a3=ffff83a6f6c0 items=0 ppid=1700 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:13.167000 audit[2868]: NETFILTER_CFG table=nat:91 family=2 entries=20 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:13.167000 audit[2868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffed0aa370 a2=0 a3=ffff83a6f6c0 items=0 ppid=1700 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:13.181993 kubelet[1444]: I0212 19:31:13.181964 1444 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-h5wlz" podStartSLOduration=18.560812783 podCreationTimestamp="2024-02-12 19:30:50 +0000 UTC" firstStartedPulling="2024-02-12 19:31:06.933959247 +0000 UTC m=+30.432297413" lastFinishedPulling="2024-02-12 19:31:11.555059263 +0000 UTC m=+35.053397429" observedRunningTime="2024-02-12 19:31:11.671868223 +0000 UTC m=+35.170206389" watchObservedRunningTime="2024-02-12 19:31:13.181912799 +0000 UTC m=+36.680250965" Feb 12 19:31:13.182347 kubelet[1444]: I0212 19:31:13.182333 1444 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:31:13.189965 systemd[1]: Created slice kubepods-besteffort-pod98fb6b38_26a8_4945_9627_032e5b015d11.slice. Feb 12 19:31:13.202098 kubelet[1444]: I0212 19:31:13.202070 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/98fb6b38-26a8-4945-9627-032e5b015d11-data\") pod \"nfs-server-provisioner-0\" (UID: \"98fb6b38-26a8-4945-9627-032e5b015d11\") " pod="default/nfs-server-provisioner-0" Feb 12 19:31:13.202329 kubelet[1444]: I0212 19:31:13.202313 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sc8sv\" (UniqueName: \"kubernetes.io/projected/98fb6b38-26a8-4945-9627-032e5b015d11-kube-api-access-sc8sv\") pod \"nfs-server-provisioner-0\" (UID: \"98fb6b38-26a8-4945-9627-032e5b015d11\") " pod="default/nfs-server-provisioner-0" Feb 12 19:31:13.492839 env[1140]: time="2024-02-12T19:31:13.492730696Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:98fb6b38-26a8-4945-9627-032e5b015d11,Namespace:default,Attempt:0,}" Feb 12 19:31:13.495318 kubelet[1444]: E0212 19:31:13.495276 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:13.682851 systemd-networkd[1045]: cali60e51b789ff: Link UP Feb 12 19:31:13.683953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:31:13.684027 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 19:31:13.684597 systemd-networkd[1045]: cali60e51b789ff: Gained carrier Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.600 [INFO][2870] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 98fb6b38-26a8-4945-9627-032e5b015d11 1086 0 2024-02-12 19:31:13 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.120 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.600 [INFO][2870] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.633 [INFO][2883] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" HandleID="k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.648 [INFO][2883] ipam_plugin.go 268: Auto assigning IP ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" HandleID="k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000bc3c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 19:31:13.633877665 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.648 [INFO][2883] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.648 [INFO][2883] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.648 [INFO][2883] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.650 [INFO][2883] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.655 [INFO][2883] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.660 [INFO][2883] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.662 [INFO][2883] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.664 [INFO][2883] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.664 [INFO][2883] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.667 [INFO][2883] ipam.go 1682: Creating new handle: k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824 Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.670 [INFO][2883] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.675 [INFO][2883] ipam.go 1216: Successfully claimed IPs: [192.168.77.68/26] block=192.168.77.64/26 handle="k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.675 [INFO][2883] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.68/26] handle="k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" host="10.0.0.120" Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.675 [INFO][2883] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:13.698926 env[1140]: 2024-02-12 19:31:13.676 [INFO][2883] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.68/26] IPv6=[] ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" HandleID="k8s-pod-network.f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:31:13.699654 env[1140]: 2024-02-12 19:31:13.677 [INFO][2870] k8s.go 385: Populated endpoint ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"98fb6b38-26a8-4945-9627-032e5b015d11", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.77.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:13.699654 env[1140]: 2024-02-12 19:31:13.677 [INFO][2870] k8s.go 386: Calico CNI using IPs: [192.168.77.68/32] ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:31:13.699654 env[1140]: 2024-02-12 19:31:13.677 [INFO][2870] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:31:13.699654 env[1140]: 2024-02-12 19:31:13.684 [INFO][2870] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:31:13.699809 env[1140]: 2024-02-12 19:31:13.685 [INFO][2870] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"98fb6b38-26a8-4945-9627-032e5b015d11", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.77.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"f2:92:7e:f2:74:ae", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:13.699809 env[1140]: 2024-02-12 19:31:13.696 [INFO][2870] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:31:13.713000 audit[2909]: NETFILTER_CFG table=filter:92 family=2 entries=42 op=nft_register_chain pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:31:13.717405 kernel: kauditd_printk_skb: 74 callbacks suppressed Feb 12 19:31:13.717467 kernel: audit: type=1325 audit(1707766273.713:819): table=filter:92 family=2 entries=42 op=nft_register_chain pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:31:13.717503 kernel: audit: type=1300 audit(1707766273.713:819): arch=c00000b7 syscall=211 success=yes exit=20688 a0=3 a1=fffff1367420 a2=0 a3=ffffb58c9fa8 items=0 ppid=2131 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.713000 audit[2909]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20688 a0=3 a1=fffff1367420 a2=0 a3=ffffb58c9fa8 items=0 ppid=2131 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.720209 kernel: audit: type=1327 audit(1707766273.713:819): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:31:13.713000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:31:13.798229 env[1140]: time="2024-02-12T19:31:13.798158977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:31:13.798427 env[1140]: time="2024-02-12T19:31:13.798384239Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:31:13.798427 env[1140]: time="2024-02-12T19:31:13.798408882Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:31:13.798816 env[1140]: time="2024-02-12T19:31:13.798732194Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824 pid=2918 runtime=io.containerd.runc.v2 Feb 12 19:31:13.810205 systemd[1]: Started cri-containerd-f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824.scope. Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.851698 kernel: audit: type=1400 audit(1707766273.846:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.851761 kernel: audit: type=1400 audit(1707766273.846:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.851782 kernel: audit: type=1400 audit(1707766273.846:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.853410 kernel: audit: type=1400 audit(1707766273.846:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.855196 kernel: audit: type=1400 audit(1707766273.846:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.856939 kernel: audit: type=1400 audit(1707766273.846:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.858761 systemd-resolved[1088]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.860567 kernel: audit: type=1400 audit(1707766273.846:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit: BPF prog-id=116 op=LOAD Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2918 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366465303263333239653865636234343632623534313337616333 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2918 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366465303263333239653865636234343632623534313337616333 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.848000 audit: BPF prog-id=117 op=LOAD Feb 12 19:31:13.848000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2918 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366465303263333239653865636234343632623534313337616333 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.850000 audit: BPF prog-id=118 op=LOAD Feb 12 19:31:13.850000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2918 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366465303263333239653865636234343632623534313337616333 Feb 12 19:31:13.852000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:31:13.852000 audit: BPF prog-id=117 op=UNLOAD Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:13.852000 audit: BPF prog-id=119 op=LOAD Feb 12 19:31:13.852000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2918 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366465303263333239653865636234343632623534313337616333 Feb 12 19:31:13.875715 env[1140]: time="2024-02-12T19:31:13.875679093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:98fb6b38-26a8-4945-9627-032e5b015d11,Namespace:default,Attempt:0,} returns sandbox id \"f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824\"" Feb 12 19:31:13.877139 env[1140]: time="2024-02-12T19:31:13.877110995Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 19:31:14.495770 kubelet[1444]: E0212 19:31:14.495718 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:15.419224 systemd-networkd[1045]: cali60e51b789ff: Gained IPv6LL Feb 12 19:31:15.495885 kubelet[1444]: E0212 19:31:15.495838 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:15.925987 update_engine[1130]: I0212 19:31:15.925930 1130 update_attempter.cc:509] Updating boot flags... Feb 12 19:31:15.947427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount11516252.mount: Deactivated successfully. Feb 12 19:31:16.496839 kubelet[1444]: E0212 19:31:16.496796 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:17.473442 kubelet[1444]: E0212 19:31:17.473390 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:17.497134 kubelet[1444]: E0212 19:31:17.497097 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:17.798554 env[1140]: time="2024-02-12T19:31:17.798502222Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:17.799864 env[1140]: time="2024-02-12T19:31:17.799833690Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:17.801396 env[1140]: time="2024-02-12T19:31:17.801364014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:17.803065 env[1140]: time="2024-02-12T19:31:17.803030709Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:17.803875 env[1140]: time="2024-02-12T19:31:17.803834295Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 12 19:31:17.805965 env[1140]: time="2024-02-12T19:31:17.805934625Z" level=info msg="CreateContainer within sandbox \"f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 19:31:17.816237 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1380422647.mount: Deactivated successfully. Feb 12 19:31:17.819903 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3594414815.mount: Deactivated successfully. Feb 12 19:31:17.823372 env[1140]: time="2024-02-12T19:31:17.823331279Z" level=info msg="CreateContainer within sandbox \"f86de02c329e8ecb4462b54137ac3a7b13e7e645973b3afc19349369c92c0824\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"d711a60317aefc775a2ecfaf20ce3013ec7a24034423871bdcf4503fade28756\"" Feb 12 19:31:17.824041 env[1140]: time="2024-02-12T19:31:17.823951449Z" level=info msg="StartContainer for \"d711a60317aefc775a2ecfaf20ce3013ec7a24034423871bdcf4503fade28756\"" Feb 12 19:31:17.851753 systemd[1]: Started cri-containerd-d711a60317aefc775a2ecfaf20ce3013ec7a24034423871bdcf4503fade28756.scope. Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit: BPF prog-id=120 op=LOAD Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2918 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:17.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313161363033313761656663373735613265636661663230636533 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2918 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:17.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313161363033313761656663373735613265636661663230636533 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit: BPF prog-id=121 op=LOAD Feb 12 19:31:17.899000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2918 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:17.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313161363033313761656663373735613265636661663230636533 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit: BPF prog-id=122 op=LOAD Feb 12 19:31:17.899000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2918 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:17.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313161363033313761656663373735613265636661663230636533 Feb 12 19:31:17.899000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:31:17.899000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:17.899000 audit: BPF prog-id=123 op=LOAD Feb 12 19:31:17.899000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2918 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:17.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313161363033313761656663373735613265636661663230636533 Feb 12 19:31:17.913232 env[1140]: time="2024-02-12T19:31:17.912404276Z" level=info msg="StartContainer for \"d711a60317aefc775a2ecfaf20ce3013ec7a24034423871bdcf4503fade28756\" returns successfully" Feb 12 19:31:18.022000 audit[3010]: AVC avc: denied { search } for pid=3010 comm="rpcbind" name="crypto" dev="proc" ino=18085 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:31:18.022000 audit[3010]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbe2af000 a2=0 a3=0 items=0 ppid=2992 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 key=(null) Feb 12 19:31:18.022000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 19:31:18.064000 audit[3015]: AVC avc: denied { search } for pid=3015 comm="dbus-daemon" name="crypto" dev="proc" ino=18085 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:31:18.064000 audit[3015]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbed8f000 a2=0 a3=0 items=0 ppid=2992 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 key=(null) Feb 12 19:31:18.064000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:31:18.075000 audit[3016]: AVC avc: denied { watch } for pid=3016 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538042 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c60,c305 tclass=dir permissive=0 Feb 12 19:31:18.075000 audit[3016]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaae9b90380 a2=2c8 a3=aaaae9b7ba60 items=0 ppid=2992 pid=3016 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 key=(null) Feb 12 19:31:18.075000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:31:18.080000 audit[3017]: AVC avc: denied { read } for pid=3017 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18107 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 19:31:18.080000 audit[3017]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffbefaa570 a2=80000 a3=0 items=0 ppid=2992 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 key=(null) Feb 12 19:31:18.080000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:31:18.081000 audit[3017]: AVC avc: denied { search } for pid=3017 comm="ganesha.nfsd" name="crypto" dev="proc" ino=18085 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:31:18.081000 audit[3017]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbe33f000 a2=0 a3=0 items=0 ppid=2992 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c305 key=(null) Feb 12 19:31:18.081000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:31:18.498289 kubelet[1444]: E0212 19:31:18.498172 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:18.688956 kubelet[1444]: I0212 19:31:18.688920 1444 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.761170628 podCreationTimestamp="2024-02-12 19:31:13 +0000 UTC" firstStartedPulling="2024-02-12 19:31:13.876882092 +0000 UTC m=+37.375220258" lastFinishedPulling="2024-02-12 19:31:17.804581916 +0000 UTC m=+41.302920082" observedRunningTime="2024-02-12 19:31:18.687396938 +0000 UTC m=+42.185735104" watchObservedRunningTime="2024-02-12 19:31:18.688870452 +0000 UTC m=+42.187208618" Feb 12 19:31:18.698000 audit[3036]: NETFILTER_CFG table=filter:93 family=2 entries=22 op=nft_register_rule pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:18.698000 audit[3036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd98b3400 a2=0 a3=ffffa82cd6c0 items=0 ppid=1700 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:18.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:18.701000 audit[3036]: NETFILTER_CFG table=nat:94 family=2 entries=104 op=nft_register_chain pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:18.701000 audit[3036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffd98b3400 a2=0 a3=ffffa82cd6c0 items=0 ppid=1700 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:18.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:19.263810 kubelet[1444]: I0212 19:31:19.263780 1444 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:31:19.330524 systemd[1]: run-containerd-runc-k8s.io-eec3c7f5e5db1c7f61b0f81eed79117c9cd505d7ac1a99573ceacf6b010db792-runc.37T8oV.mount: Deactivated successfully. Feb 12 19:31:19.352000 audit[3077]: NETFILTER_CFG table=filter:95 family=2 entries=9 op=nft_register_rule pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:19.353730 kernel: kauditd_printk_skb: 128 callbacks suppressed Feb 12 19:31:19.353879 kernel: audit: type=1325 audit(1707766279.352:863): table=filter:95 family=2 entries=9 op=nft_register_rule pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:19.352000 audit[3077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff09984e0 a2=0 a3=ffffaec596c0 items=0 ppid=1700 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:19.358678 kernel: audit: type=1300 audit(1707766279.352:863): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff09984e0 a2=0 a3=ffffaec596c0 items=0 ppid=1700 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:19.358734 kernel: audit: type=1327 audit(1707766279.352:863): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:19.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:19.362000 audit[3077]: NETFILTER_CFG table=nat:96 family=2 entries=51 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:19.362000 audit[3077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17716 a0=3 a1=fffff09984e0 a2=0 a3=ffffaec596c0 items=0 ppid=1700 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:19.368275 kernel: audit: type=1325 audit(1707766279.362:864): table=nat:96 family=2 entries=51 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:19.368352 kernel: audit: type=1300 audit(1707766279.362:864): arch=c00000b7 syscall=211 success=yes exit=17716 a0=3 a1=fffff09984e0 a2=0 a3=ffffaec596c0 items=0 ppid=1700 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:19.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:19.370836 kernel: audit: type=1327 audit(1707766279.362:864): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:19.498891 kubelet[1444]: E0212 19:31:19.498830 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:20.499619 kubelet[1444]: E0212 19:31:20.499586 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:21.500515 kubelet[1444]: E0212 19:31:21.500453 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:22.501441 kubelet[1444]: E0212 19:31:22.501399 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:23.501818 kubelet[1444]: E0212 19:31:23.501778 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:24.502349 kubelet[1444]: E0212 19:31:24.502310 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:25.502792 kubelet[1444]: E0212 19:31:25.502755 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:26.503476 kubelet[1444]: E0212 19:31:26.503409 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:27.376113 kubelet[1444]: I0212 19:31:27.376074 1444 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:31:27.382284 systemd[1]: Created slice kubepods-besteffort-pod122aa035_6c12_46ed_9d05_cce6f7498826.slice. Feb 12 19:31:27.479526 kubelet[1444]: I0212 19:31:27.479495 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x7cns\" (UniqueName: \"kubernetes.io/projected/122aa035-6c12-46ed-9d05-cce6f7498826-kube-api-access-x7cns\") pod \"test-pod-1\" (UID: \"122aa035-6c12-46ed-9d05-cce6f7498826\") " pod="default/test-pod-1" Feb 12 19:31:27.479771 kubelet[1444]: I0212 19:31:27.479756 1444 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-60eee9fb-b08c-4aaa-810c-4148cd6d81cb\" (UniqueName: \"kubernetes.io/nfs/122aa035-6c12-46ed-9d05-cce6f7498826-pvc-60eee9fb-b08c-4aaa-810c-4148cd6d81cb\") pod \"test-pod-1\" (UID: \"122aa035-6c12-46ed-9d05-cce6f7498826\") " pod="default/test-pod-1" Feb 12 19:31:27.503853 kubelet[1444]: E0212 19:31:27.503805 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:27.594000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.599194 kernel: Failed to create system directory netfs Feb 12 19:31:27.599265 kernel: audit: type=1400 audit(1707766287.594:865): avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.599290 kernel: Failed to create system directory netfs Feb 12 19:31:27.599309 kernel: Failed to create system directory netfs Feb 12 19:31:27.599329 kernel: Failed to create system directory netfs Feb 12 19:31:27.594000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.603084 kernel: audit: type=1400 audit(1707766287.594:865): avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.603166 kernel: audit: type=1400 audit(1707766287.594:865): avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.594000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.605285 kernel: audit: type=1400 audit(1707766287.594:865): avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.594000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.606839 kernel: audit: type=1300 audit(1707766287.594:865): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a31d5e0 a1=12c14 a2=aaaae474e028 a3=aaab0a30e010 items=0 ppid=1079 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.594000 audit[3089]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a31d5e0 a1=12c14 a2=aaaae474e028 a3=aaab0a30e010 items=0 ppid=1079 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.609462 kernel: Failed to create system directory fscache Feb 12 19:31:27.609569 kernel: audit: type=1327 audit(1707766287.594:865): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:31:27.594000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:31:27.609914 kernel: Failed to create system directory fscache Feb 12 19:31:27.610764 kernel: audit: type=1400 audit(1707766287.602:866): avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.610833 kernel: audit: type=1400 audit(1707766287.602:866): avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.617174 kernel: Failed to create system directory fscache Feb 12 19:31:27.617229 kernel: audit: type=1400 audit(1707766287.602:866): avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.617255 kernel: Failed to create system directory fscache Feb 12 19:31:27.617271 kernel: audit: type=1400 audit(1707766287.602:866): avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.617577 kernel: Failed to create system directory fscache Feb 12 19:31:27.617632 kernel: Failed to create system directory fscache Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.620640 kernel: Failed to create system directory fscache Feb 12 19:31:27.620672 kernel: Failed to create system directory fscache Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.621872 kernel: Failed to create system directory fscache Feb 12 19:31:27.621910 kernel: Failed to create system directory fscache Feb 12 19:31:27.621926 kernel: Failed to create system directory fscache Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.622699 kernel: Failed to create system directory fscache Feb 12 19:31:27.622750 kernel: Failed to create system directory fscache Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.602000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.623506 kernel: Failed to create system directory fscache Feb 12 19:31:27.602000 audit[3089]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a530210 a1=4c344 a2=aaaae474e028 a3=aaab0a30e010 items=0 ppid=1079 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.602000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:31:27.624554 kernel: FS-Cache: Loaded Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.642994 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.643052 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.643071 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.643086 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.643832 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.643881 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.644638 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.644673 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.645846 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.645884 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.645901 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.646724 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.646784 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.647509 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.647544 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.648737 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.648802 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.648824 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.649520 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.649563 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.650736 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.650816 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.650844 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.651519 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.651552 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.652807 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.652835 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.652852 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.653660 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.653707 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.654492 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.654525 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.655810 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.655833 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.655850 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.656683 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.656704 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.657498 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.657519 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.658843 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.658893 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.658910 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.659697 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.659715 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.660542 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.660564 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.661863 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.661892 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.661910 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.662698 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.662723 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.663570 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.663586 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.664874 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.664910 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.664937 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.665703 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.665734 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.666560 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.666615 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.667764 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.667803 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.667821 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.668592 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.668653 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.669821 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.669848 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.669868 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.670655 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.670711 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.671886 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.671929 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.671948 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.672741 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.672797 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.675390 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.675926 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.675987 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.676756 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.676799 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.677580 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.677639 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.679502 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.679543 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.680794 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.680838 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.680857 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.681588 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.681619 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.682827 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.682855 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.682869 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.683677 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.683696 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.684513 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.684564 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.685727 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.685760 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.685775 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.686528 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.686549 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.687759 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.687783 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.687798 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.688850 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.688903 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.689823 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.689897 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.689917 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.690638 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.690688 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.691532 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.691577 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.692563 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.692589 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.693749 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.693799 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.693819 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.694557 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.694593 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.695850 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.695871 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.695885 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.696721 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.696749 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.634000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.697559 kernel: Failed to create system directory sunrpc Feb 12 19:31:27.705240 kernel: RPC: Registered named UNIX socket transport module. Feb 12 19:31:27.705291 kernel: RPC: Registered udp transport module. Feb 12 19:31:27.705319 kernel: RPC: Registered tcp transport module. Feb 12 19:31:27.705340 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 19:31:27.634000 audit[3089]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a57c560 a1=fbb6c a2=aaaae474e028 a3=aaab0a30e010 items=6 ppid=1079 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.634000 audit: CWD cwd="/" Feb 12 19:31:27.634000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:27.634000 audit: PATH item=1 name=(null) inode=17288 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:27.634000 audit: PATH item=2 name=(null) inode=17288 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:27.634000 audit: PATH item=3 name=(null) inode=17289 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:27.634000 audit: PATH item=4 name=(null) inode=17288 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:27.634000 audit: PATH item=5 name=(null) inode=17290 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:27.634000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.727585 kernel: Failed to create system directory nfs Feb 12 19:31:27.727619 kernel: Failed to create system directory nfs Feb 12 19:31:27.727634 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.728844 kernel: Failed to create system directory nfs Feb 12 19:31:27.728877 kernel: Failed to create system directory nfs Feb 12 19:31:27.728896 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.729659 kernel: Failed to create system directory nfs Feb 12 19:31:27.729676 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.730831 kernel: Failed to create system directory nfs Feb 12 19:31:27.730862 kernel: Failed to create system directory nfs Feb 12 19:31:27.730882 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.731613 kernel: Failed to create system directory nfs Feb 12 19:31:27.731668 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.732796 kernel: Failed to create system directory nfs Feb 12 19:31:27.732822 kernel: Failed to create system directory nfs Feb 12 19:31:27.732836 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.733565 kernel: Failed to create system directory nfs Feb 12 19:31:27.733581 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.734747 kernel: Failed to create system directory nfs Feb 12 19:31:27.734771 kernel: Failed to create system directory nfs Feb 12 19:31:27.734790 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.735509 kernel: Failed to create system directory nfs Feb 12 19:31:27.735573 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.736741 kernel: Failed to create system directory nfs Feb 12 19:31:27.736765 kernel: Failed to create system directory nfs Feb 12 19:31:27.736794 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.737572 kernel: Failed to create system directory nfs Feb 12 19:31:27.737596 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.738787 kernel: Failed to create system directory nfs Feb 12 19:31:27.738818 kernel: Failed to create system directory nfs Feb 12 19:31:27.738836 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.739645 kernel: Failed to create system directory nfs Feb 12 19:31:27.739672 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.740946 kernel: Failed to create system directory nfs Feb 12 19:31:27.740983 kernel: Failed to create system directory nfs Feb 12 19:31:27.741012 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.741677 kernel: Failed to create system directory nfs Feb 12 19:31:27.741707 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.742841 kernel: Failed to create system directory nfs Feb 12 19:31:27.742866 kernel: Failed to create system directory nfs Feb 12 19:31:27.742881 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.743614 kernel: Failed to create system directory nfs Feb 12 19:31:27.743631 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.744806 kernel: Failed to create system directory nfs Feb 12 19:31:27.744856 kernel: Failed to create system directory nfs Feb 12 19:31:27.744874 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.745584 kernel: Failed to create system directory nfs Feb 12 19:31:27.745643 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.746813 kernel: Failed to create system directory nfs Feb 12 19:31:27.746836 kernel: Failed to create system directory nfs Feb 12 19:31:27.746849 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.747592 kernel: Failed to create system directory nfs Feb 12 19:31:27.747613 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.748813 kernel: Failed to create system directory nfs Feb 12 19:31:27.748835 kernel: Failed to create system directory nfs Feb 12 19:31:27.748855 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.749679 kernel: Failed to create system directory nfs Feb 12 19:31:27.749696 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.721000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.750509 kernel: Failed to create system directory nfs Feb 12 19:31:27.721000 audit[3089]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a6a8b40 a1=ae35c a2=aaaae474e028 a3=aaab0a30e010 items=0 ppid=1079 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.721000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:31:27.763523 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.788668 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.788713 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.788730 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.790001 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.790057 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.790640 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.791804 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.791839 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.791854 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.792755 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.792794 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.793601 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.793637 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.794838 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.794875 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.794890 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.795653 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.795724 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.797320 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.797390 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.797408 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.797425 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.797870 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.798524 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.798583 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.799719 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.799748 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.799775 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.800523 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.800561 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.801891 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.801919 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.801933 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.802750 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.802774 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.803559 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.803587 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.804769 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.804792 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.804806 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.805561 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.805591 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.806763 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.806789 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.806811 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.807648 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.807681 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.808520 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.808558 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.809716 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.809742 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.809756 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.810513 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.810537 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.811776 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.811807 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.811822 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.812581 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.812597 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.813786 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.813810 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.813824 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.814583 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.814611 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.815883 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.815900 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.815919 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.816747 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.816764 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.817628 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.817645 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.818538 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.818576 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.819797 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.819833 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.819849 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.820661 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.820705 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.821536 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.822892 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.822909 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.822930 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.822944 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.823760 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.823786 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.824623 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.824660 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.825903 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.825925 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.825938 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.826801 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.826881 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.827642 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.827677 kernel: Failed to create system directory nfs4 Feb 12 19:31:27.779000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.934941 kernel: NFS: Registering the id_resolver key type Feb 12 19:31:27.935073 kernel: Key type id_resolver registered Feb 12 19:31:27.935098 kernel: Key type id_legacy registered Feb 12 19:31:27.779000 audit[3094]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff810eb010 a1=167c04 a2=aaaadcbce028 a3=aaaafc3c3010 items=0 ppid=1079 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.779000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.950772 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.950825 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.950847 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.950866 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.951740 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.952638 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.952662 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.952683 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.953505 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.953526 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.954855 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.954876 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.954892 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.955756 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.955773 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.956642 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.956664 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.957505 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.957521 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.958761 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.958784 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.958798 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.959575 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.959598 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.945000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:31:27.960879 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.960902 kernel: Failed to create system directory rpcgss Feb 12 19:31:27.945000 audit[3095]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff98393010 a1=3e09c a2=aaaacb79e028 a3=aaaaf0305010 items=0 ppid=1079 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.945000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 19:31:27.975400 nfsidmap[3102]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 12 19:31:27.978306 nfsidmap[3105]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 12 19:31:27.992000 audit[1201]: AVC avc: denied { watch_reads } for pid=1201 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2535 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:31:27.992000 audit[1201]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad2959090 a2=10 a3=0 items=0 ppid=1 pid=1201 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.992000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:31:27.992000 audit[1201]: AVC avc: denied { watch_reads } for pid=1201 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2535 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:31:27.992000 audit[1201]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad2959090 a2=10 a3=0 items=0 ppid=1 pid=1201 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:27.992000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:31:27.992000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2535 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:31:27.992000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2535 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:31:28.287024 env[1140]: time="2024-02-12T19:31:28.286983182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:122aa035-6c12-46ed-9d05-cce6f7498826,Namespace:default,Attempt:0,}" Feb 12 19:31:28.423898 systemd-networkd[1045]: cali5ec59c6bf6e: Link UP Feb 12 19:31:28.425626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:31:28.425698 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 19:31:28.425470 systemd-networkd[1045]: cali5ec59c6bf6e: Gained carrier Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.336 [INFO][3109] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-test--pod--1-eth0 default 122aa035-6c12-46ed-9d05-cce6f7498826 1153 0 2024-02-12 19:31:13 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.336 [INFO][3109] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.364 [INFO][3122] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" HandleID="k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Workload="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.380 [INFO][3122] ipam_plugin.go 268: Auto assigning IP ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" HandleID="k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Workload="10.0.0.120-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002dc7f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"test-pod-1", "timestamp":"2024-02-12 19:31:28.364092653 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.380 [INFO][3122] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.380 [INFO][3122] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.381 [INFO][3122] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.382 [INFO][3122] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.388 [INFO][3122] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.393 [INFO][3122] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.397 [INFO][3122] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.400 [INFO][3122] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.400 [INFO][3122] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.403 [INFO][3122] ipam.go 1682: Creating new handle: k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761 Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.409 [INFO][3122] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.418 [INFO][3122] ipam.go 1216: Successfully claimed IPs: [192.168.77.69/26] block=192.168.77.64/26 handle="k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.418 [INFO][3122] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.69/26] handle="k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" host="10.0.0.120" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.418 [INFO][3122] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.418 [INFO][3122] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.69/26] IPv6=[] ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" HandleID="k8s-pod-network.5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Workload="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.420 [INFO][3109] k8s.go 385: Populated endpoint ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"122aa035-6c12-46ed-9d05-cce6f7498826", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:28.434552 env[1140]: 2024-02-12 19:31:28.420 [INFO][3109] k8s.go 386: Calico CNI using IPs: [192.168.77.69/32] ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 19:31:28.435197 env[1140]: 2024-02-12 19:31:28.420 [INFO][3109] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 19:31:28.435197 env[1140]: 2024-02-12 19:31:28.426 [INFO][3109] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 19:31:28.435197 env[1140]: 2024-02-12 19:31:28.426 [INFO][3109] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"122aa035-6c12-46ed-9d05-cce6f7498826", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"9e:69:a4:09:74:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:28.435197 env[1140]: 2024-02-12 19:31:28.432 [INFO][3109] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 19:31:28.455000 audit[3149]: NETFILTER_CFG table=filter:97 family=2 entries=42 op=nft_register_chain pid=3149 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:31:28.455000 audit[3149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20268 a0=3 a1=ffffea6f3f30 a2=0 a3=ffffb1bcbfa8 items=0 ppid=2131 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.455000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:31:28.459426 env[1140]: time="2024-02-12T19:31:28.459039771Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:31:28.459426 env[1140]: time="2024-02-12T19:31:28.459305664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:31:28.459426 env[1140]: time="2024-02-12T19:31:28.459316184Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:31:28.459740 env[1140]: time="2024-02-12T19:31:28.459660682Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761 pid=3151 runtime=io.containerd.runc.v2 Feb 12 19:31:28.471579 systemd[1]: Started cri-containerd-5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761.scope. Feb 12 19:31:28.504404 kubelet[1444]: E0212 19:31:28.504352 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:28.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit: BPF prog-id=124 op=LOAD Feb 12 19:31:28.512000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3151 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613836636562373861313162323465333731616134666566633034 Feb 12 19:31:28.512000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.512000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3151 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613836636562373861313162323465333731616134666566633034 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit: BPF prog-id=125 op=LOAD Feb 12 19:31:28.513000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3151 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613836636562373861313162323465333731616134666566633034 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.513000 audit: BPF prog-id=126 op=LOAD Feb 12 19:31:28.513000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3151 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613836636562373861313162323465333731616134666566633034 Feb 12 19:31:28.514000 audit: BPF prog-id=126 op=UNLOAD Feb 12 19:31:28.514000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.514000 audit: BPF prog-id=127 op=LOAD Feb 12 19:31:28.514000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3151 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613836636562373861313162323465333731616134666566633034 Feb 12 19:31:28.517377 systemd-resolved[1088]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:31:28.537649 env[1140]: time="2024-02-12T19:31:28.537526631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:122aa035-6c12-46ed-9d05-cce6f7498826,Namespace:default,Attempt:0,} returns sandbox id \"5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761\"" Feb 12 19:31:28.540375 env[1140]: time="2024-02-12T19:31:28.540336050Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:31:28.863795 env[1140]: time="2024-02-12T19:31:28.863672076Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:28.865308 env[1140]: time="2024-02-12T19:31:28.865273916Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:28.866988 env[1140]: time="2024-02-12T19:31:28.866961640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:28.868478 env[1140]: time="2024-02-12T19:31:28.868437033Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:28.869087 env[1140]: time="2024-02-12T19:31:28.869057904Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 12 19:31:28.871091 env[1140]: time="2024-02-12T19:31:28.871056363Z" level=info msg="CreateContainer within sandbox \"5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 19:31:28.881293 env[1140]: time="2024-02-12T19:31:28.881250150Z" level=info msg="CreateContainer within sandbox \"5da86ceb78a11b24e371aa4fefc04d52c284bbe648ce02868eb9aa78a19a6761\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"4675123c55e230317bbdc7f8efac41e11e803ebcea606cb9b813a4d2c9c5d92b\"" Feb 12 19:31:28.881887 env[1140]: time="2024-02-12T19:31:28.881862460Z" level=info msg="StartContainer for \"4675123c55e230317bbdc7f8efac41e11e803ebcea606cb9b813a4d2c9c5d92b\"" Feb 12 19:31:28.904791 systemd[1]: Started cri-containerd-4675123c55e230317bbdc7f8efac41e11e803ebcea606cb9b813a4d2c9c5d92b.scope. Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit: BPF prog-id=128 op=LOAD Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3151 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373531323363353565323330333137626264633766386566616334 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3151 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373531323363353565323330333137626264633766386566616334 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit: BPF prog-id=129 op=LOAD Feb 12 19:31:28.931000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3151 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373531323363353565323330333137626264633766386566616334 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit: BPF prog-id=130 op=LOAD Feb 12 19:31:28.931000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3151 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373531323363353565323330333137626264633766386566616334 Feb 12 19:31:28.931000 audit: BPF prog-id=130 op=UNLOAD Feb 12 19:31:28.931000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:28.931000 audit: BPF prog-id=131 op=LOAD Feb 12 19:31:28.931000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3151 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:28.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373531323363353565323330333137626264633766386566616334 Feb 12 19:31:28.946385 env[1140]: time="2024-02-12T19:31:28.946342304Z" level=info msg="StartContainer for \"4675123c55e230317bbdc7f8efac41e11e803ebcea606cb9b813a4d2c9c5d92b\" returns successfully" Feb 12 19:31:29.504731 kubelet[1444]: E0212 19:31:29.504664 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:29.690713 systemd-networkd[1045]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 19:31:30.505807 kubelet[1444]: E0212 19:31:30.505776 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:31.506444 kubelet[1444]: E0212 19:31:31.506398 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:32.507581 kubelet[1444]: E0212 19:31:32.507529 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:33.508194 kubelet[1444]: E0212 19:31:33.508134 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:34.508464 kubelet[1444]: E0212 19:31:34.508418 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:31:35.163000 audit[3270]: NETFILTER_CFG table=filter:98 family=2 entries=8 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:35.165935 kernel: kauditd_printk_skb: 457 callbacks suppressed Feb 12 19:31:35.166058 kernel: audit: type=1325 audit(1707766295.163:912): table=filter:98 family=2 entries=8 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:35.163000 audit[3270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffddfbeb90 a2=0 a3=ffffae1f56c0 items=0 ppid=1700 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:35.171057 kernel: audit: type=1300 audit(1707766295.163:912): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffddfbeb90 a2=0 a3=ffffae1f56c0 items=0 ppid=1700 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:35.171122 kernel: audit: type=1327 audit(1707766295.163:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:35.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:35.166000 audit[3270]: NETFILTER_CFG table=nat:99 family=2 entries=58 op=nft_register_chain pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:35.166000 audit[3270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19604 a0=3 a1=ffffddfbeb90 a2=0 a3=ffffae1f56c0 items=0 ppid=1700 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:35.181765 kernel: audit: type=1325 audit(1707766295.166:913): table=nat:99 family=2 entries=58 op=nft_register_chain pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:35.181823 kernel: audit: type=1300 audit(1707766295.166:913): arch=c00000b7 syscall=211 success=yes exit=19604 a0=3 a1=ffffddfbeb90 a2=0 a3=ffffae1f56c0 items=0 ppid=1700 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:35.181843 kernel: audit: type=1327 audit(1707766295.166:913): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:35.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:35.508595 kubelet[1444]: E0212 19:31:35.508546 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"