Apr 12 18:43:28.093927 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:43:28.093951 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:43:28.093960 kernel: BIOS-provided physical RAM map: Apr 12 18:43:28.093966 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 18:43:28.093971 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 18:43:28.093977 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 18:43:28.093983 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Apr 12 18:43:28.093989 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Apr 12 18:43:28.093996 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Apr 12 18:43:28.094002 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 18:43:28.094007 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Apr 12 18:43:28.094013 kernel: NX (Execute Disable) protection: active Apr 12 18:43:28.094018 kernel: SMBIOS 2.8 present. Apr 12 18:43:28.094024 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Apr 12 18:43:28.094032 kernel: Hypervisor detected: KVM Apr 12 18:43:28.094039 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:43:28.094045 kernel: kvm-clock: cpu 0, msr 1d191001, primary cpu clock Apr 12 18:43:28.094051 kernel: kvm-clock: using sched offset of 3370659073 cycles Apr 12 18:43:28.094057 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:43:28.094064 kernel: tsc: Detected 2794.748 MHz processor Apr 12 18:43:28.094070 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:43:28.094076 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:43:28.094086 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Apr 12 18:43:28.094093 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:43:28.094099 kernel: Using GB pages for direct mapping Apr 12 18:43:28.094106 kernel: ACPI: Early table checksum verification disabled Apr 12 18:43:28.094112 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Apr 12 18:43:28.094118 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:43:28.094124 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:43:28.094130 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:43:28.094136 kernel: ACPI: FACS 0x000000009CFE0000 000040 Apr 12 18:43:28.094142 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:43:28.094149 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:43:28.094155 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:43:28.094162 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Apr 12 18:43:28.094168 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Apr 12 18:43:28.094174 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Apr 12 18:43:28.094180 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Apr 12 18:43:28.094186 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Apr 12 18:43:28.094192 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Apr 12 18:43:28.094202 kernel: No NUMA configuration found Apr 12 18:43:28.094208 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Apr 12 18:43:28.094215 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Apr 12 18:43:28.094221 kernel: Zone ranges: Apr 12 18:43:28.094228 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:43:28.094234 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Apr 12 18:43:28.094242 kernel: Normal empty Apr 12 18:43:28.094248 kernel: Movable zone start for each node Apr 12 18:43:28.094255 kernel: Early memory node ranges Apr 12 18:43:28.094271 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 18:43:28.094277 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Apr 12 18:43:28.094284 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Apr 12 18:43:28.094291 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:43:28.094297 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 18:43:28.094304 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Apr 12 18:43:28.094312 kernel: ACPI: PM-Timer IO Port: 0x608 Apr 12 18:43:28.094327 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:43:28.094334 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:43:28.094344 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 18:43:28.094350 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:43:28.094357 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:43:28.094363 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:43:28.094370 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:43:28.094376 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:43:28.094384 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 18:43:28.094391 kernel: TSC deadline timer available Apr 12 18:43:28.094397 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Apr 12 18:43:28.094404 kernel: kvm-guest: KVM setup pv remote TLB flush Apr 12 18:43:28.094410 kernel: kvm-guest: setup PV sched yield Apr 12 18:43:28.094419 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Apr 12 18:43:28.094426 kernel: Booting paravirtualized kernel on KVM Apr 12 18:43:28.094432 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:43:28.094439 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Apr 12 18:43:28.094446 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Apr 12 18:43:28.094454 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Apr 12 18:43:28.094460 kernel: pcpu-alloc: [0] 0 1 2 3 Apr 12 18:43:28.094466 kernel: kvm-guest: setup async PF for cpu 0 Apr 12 18:43:28.094473 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Apr 12 18:43:28.094479 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:43:28.094486 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:43:28.094493 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Apr 12 18:43:28.094499 kernel: Policy zone: DMA32 Apr 12 18:43:28.094507 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:43:28.094515 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:43:28.094522 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:43:28.094528 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:43:28.094535 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:43:28.094542 kernel: Memory: 2436704K/2571756K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 134792K reserved, 0K cma-reserved) Apr 12 18:43:28.094548 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 12 18:43:28.094555 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:43:28.094561 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:43:28.094569 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:43:28.094576 kernel: rcu: RCU event tracing is enabled. Apr 12 18:43:28.094583 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 12 18:43:28.094589 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:43:28.094596 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:43:28.094603 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:43:28.094610 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 12 18:43:28.094616 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Apr 12 18:43:28.094623 kernel: random: crng init done Apr 12 18:43:28.094630 kernel: Console: colour VGA+ 80x25 Apr 12 18:43:28.094637 kernel: printk: console [ttyS0] enabled Apr 12 18:43:28.094643 kernel: ACPI: Core revision 20210730 Apr 12 18:43:28.094650 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Apr 12 18:43:28.094657 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:43:28.094663 kernel: x2apic enabled Apr 12 18:43:28.094670 kernel: Switched APIC routing to physical x2apic. Apr 12 18:43:28.094676 kernel: kvm-guest: setup PV IPIs Apr 12 18:43:28.094683 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 18:43:28.094690 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Apr 12 18:43:28.094697 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Apr 12 18:43:28.094704 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Apr 12 18:43:28.094710 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Apr 12 18:43:28.094717 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Apr 12 18:43:28.094726 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:43:28.094735 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 18:43:28.094741 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:43:28.094748 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:43:28.094760 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Apr 12 18:43:28.094767 kernel: RETBleed: Mitigation: untrained return thunk Apr 12 18:43:28.094776 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:43:28.094783 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:43:28.094790 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:43:28.094796 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:43:28.094803 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:43:28.094810 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:43:28.094817 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 18:43:28.094826 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:43:28.094832 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:43:28.094839 kernel: LSM: Security Framework initializing Apr 12 18:43:28.094846 kernel: SELinux: Initializing. Apr 12 18:43:28.094853 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:43:28.094860 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:43:28.094867 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Apr 12 18:43:28.094875 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Apr 12 18:43:28.094882 kernel: ... version: 0 Apr 12 18:43:28.094889 kernel: ... bit width: 48 Apr 12 18:43:28.094896 kernel: ... generic registers: 6 Apr 12 18:43:28.094902 kernel: ... value mask: 0000ffffffffffff Apr 12 18:43:28.094909 kernel: ... max period: 00007fffffffffff Apr 12 18:43:28.094916 kernel: ... fixed-purpose events: 0 Apr 12 18:43:28.094923 kernel: ... event mask: 000000000000003f Apr 12 18:43:28.094930 kernel: signal: max sigframe size: 1776 Apr 12 18:43:28.094938 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:43:28.094945 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:43:28.094951 kernel: x86: Booting SMP configuration: Apr 12 18:43:28.094958 kernel: .... node #0, CPUs: #1 Apr 12 18:43:28.094965 kernel: kvm-clock: cpu 1, msr 1d191041, secondary cpu clock Apr 12 18:43:28.094972 kernel: kvm-guest: setup async PF for cpu 1 Apr 12 18:43:28.094979 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Apr 12 18:43:28.094986 kernel: #2 Apr 12 18:43:28.094993 kernel: kvm-clock: cpu 2, msr 1d191081, secondary cpu clock Apr 12 18:43:28.095000 kernel: kvm-guest: setup async PF for cpu 2 Apr 12 18:43:28.095008 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Apr 12 18:43:28.095014 kernel: #3 Apr 12 18:43:28.095021 kernel: kvm-clock: cpu 3, msr 1d1910c1, secondary cpu clock Apr 12 18:43:28.095028 kernel: kvm-guest: setup async PF for cpu 3 Apr 12 18:43:28.095035 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Apr 12 18:43:28.095042 kernel: smp: Brought up 1 node, 4 CPUs Apr 12 18:43:28.095049 kernel: smpboot: Max logical packages: 1 Apr 12 18:43:28.095056 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Apr 12 18:43:28.095063 kernel: devtmpfs: initialized Apr 12 18:43:28.095073 kernel: x86/mm: Memory block size: 128MB Apr 12 18:43:28.095080 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:43:28.095087 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 12 18:43:28.095094 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:43:28.095101 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:43:28.095108 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:43:28.095115 kernel: audit: type=2000 audit(1712947407.007:1): state=initialized audit_enabled=0 res=1 Apr 12 18:43:28.095121 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:43:28.095128 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:43:28.095136 kernel: cpuidle: using governor menu Apr 12 18:43:28.095143 kernel: ACPI: bus type PCI registered Apr 12 18:43:28.095150 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:43:28.095157 kernel: dca service started, version 1.12.1 Apr 12 18:43:28.095164 kernel: PCI: Using configuration type 1 for base access Apr 12 18:43:28.095171 kernel: PCI: Using configuration type 1 for extended access Apr 12 18:43:28.095177 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:43:28.095184 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:43:28.095192 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:43:28.095200 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:43:28.095207 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:43:28.095214 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:43:28.095221 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:43:28.095228 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:43:28.095234 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:43:28.095241 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:43:28.095248 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:43:28.095255 kernel: ACPI: Interpreter enabled Apr 12 18:43:28.095271 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:43:28.095278 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:43:28.095286 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:43:28.095293 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Apr 12 18:43:28.095299 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:43:28.095451 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:43:28.095464 kernel: acpiphp: Slot [3] registered Apr 12 18:43:28.095471 kernel: acpiphp: Slot [4] registered Apr 12 18:43:28.095480 kernel: acpiphp: Slot [5] registered Apr 12 18:43:28.095487 kernel: acpiphp: Slot [6] registered Apr 12 18:43:28.095494 kernel: acpiphp: Slot [7] registered Apr 12 18:43:28.095501 kernel: acpiphp: Slot [8] registered Apr 12 18:43:28.095507 kernel: acpiphp: Slot [9] registered Apr 12 18:43:28.095514 kernel: acpiphp: Slot [10] registered Apr 12 18:43:28.095521 kernel: acpiphp: Slot [11] registered Apr 12 18:43:28.095528 kernel: acpiphp: Slot [12] registered Apr 12 18:43:28.095535 kernel: acpiphp: Slot [13] registered Apr 12 18:43:28.095541 kernel: acpiphp: Slot [14] registered Apr 12 18:43:28.095549 kernel: acpiphp: Slot [15] registered Apr 12 18:43:28.095556 kernel: acpiphp: Slot [16] registered Apr 12 18:43:28.095563 kernel: acpiphp: Slot [17] registered Apr 12 18:43:28.095570 kernel: acpiphp: Slot [18] registered Apr 12 18:43:28.095576 kernel: acpiphp: Slot [19] registered Apr 12 18:43:28.095583 kernel: acpiphp: Slot [20] registered Apr 12 18:43:28.095590 kernel: acpiphp: Slot [21] registered Apr 12 18:43:28.095597 kernel: acpiphp: Slot [22] registered Apr 12 18:43:28.095603 kernel: acpiphp: Slot [23] registered Apr 12 18:43:28.095612 kernel: acpiphp: Slot [24] registered Apr 12 18:43:28.095618 kernel: acpiphp: Slot [25] registered Apr 12 18:43:28.095625 kernel: acpiphp: Slot [26] registered Apr 12 18:43:28.095632 kernel: acpiphp: Slot [27] registered Apr 12 18:43:28.095639 kernel: acpiphp: Slot [28] registered Apr 12 18:43:28.095646 kernel: acpiphp: Slot [29] registered Apr 12 18:43:28.095652 kernel: acpiphp: Slot [30] registered Apr 12 18:43:28.095659 kernel: acpiphp: Slot [31] registered Apr 12 18:43:28.095666 kernel: PCI host bridge to bus 0000:00 Apr 12 18:43:28.095758 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:43:28.095826 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:43:28.095892 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:43:28.095958 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Apr 12 18:43:28.096023 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Apr 12 18:43:28.096090 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:43:28.096186 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:43:28.096290 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 18:43:28.096404 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Apr 12 18:43:28.096485 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Apr 12 18:43:28.096560 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Apr 12 18:43:28.096634 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Apr 12 18:43:28.096709 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Apr 12 18:43:28.096787 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Apr 12 18:43:28.096876 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:43:28.096952 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Apr 12 18:43:28.097026 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Apr 12 18:43:28.097827 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Apr 12 18:43:28.098025 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Apr 12 18:43:28.098141 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Apr 12 18:43:28.098277 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Apr 12 18:43:28.098410 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:43:28.098549 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:43:28.098654 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 18:43:28.098761 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Apr 12 18:43:28.098861 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Apr 12 18:43:28.098982 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Apr 12 18:43:28.099089 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Apr 12 18:43:28.099188 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Apr 12 18:43:28.099297 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Apr 12 18:43:28.099426 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:43:28.099527 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Apr 12 18:43:28.099620 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Apr 12 18:43:28.099718 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Apr 12 18:43:28.099823 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Apr 12 18:43:28.099836 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:43:28.099847 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:43:28.099863 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:43:28.099873 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:43:28.099882 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:43:28.099893 kernel: iommu: Default domain type: Translated Apr 12 18:43:28.099909 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:43:28.100023 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Apr 12 18:43:28.100125 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:43:28.100224 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Apr 12 18:43:28.100239 kernel: vgaarb: loaded Apr 12 18:43:28.100248 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:43:28.100258 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:43:28.100278 kernel: PTP clock support registered Apr 12 18:43:28.100287 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:43:28.100296 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:43:28.100310 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 18:43:28.100333 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Apr 12 18:43:28.100343 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Apr 12 18:43:28.100352 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Apr 12 18:43:28.100362 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:43:28.100371 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:43:28.100381 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:43:28.100390 kernel: pnp: PnP ACPI init Apr 12 18:43:28.100489 kernel: pnp 00:02: [dma 2] Apr 12 18:43:28.100503 kernel: pnp: PnP ACPI: found 6 devices Apr 12 18:43:28.100511 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:43:28.100519 kernel: NET: Registered PF_INET protocol family Apr 12 18:43:28.100527 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:43:28.100534 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:43:28.100541 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:43:28.100549 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:43:28.100556 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:43:28.100565 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:43:28.100572 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:43:28.100579 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:43:28.100587 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:43:28.100594 kernel: NET: Registered PF_XDP protocol family Apr 12 18:43:28.100670 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:43:28.100738 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:43:28.100803 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:43:28.100872 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Apr 12 18:43:28.100949 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Apr 12 18:43:28.101060 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Apr 12 18:43:28.101140 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:43:28.101216 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 18:43:28.101225 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:43:28.101233 kernel: Initialise system trusted keyrings Apr 12 18:43:28.101240 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:43:28.101251 kernel: Key type asymmetric registered Apr 12 18:43:28.101258 kernel: Asymmetric key parser 'x509' registered Apr 12 18:43:28.101280 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:43:28.101288 kernel: io scheduler mq-deadline registered Apr 12 18:43:28.101295 kernel: io scheduler kyber registered Apr 12 18:43:28.101302 kernel: io scheduler bfq registered Apr 12 18:43:28.101309 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:43:28.101318 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:43:28.101336 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 18:43:28.101343 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:43:28.101353 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:43:28.101360 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:43:28.101368 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:43:28.101375 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:43:28.101382 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:43:28.101486 kernel: rtc_cmos 00:05: RTC can wake from S4 Apr 12 18:43:28.101498 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:43:28.101566 kernel: rtc_cmos 00:05: registered as rtc0 Apr 12 18:43:28.101637 kernel: rtc_cmos 00:05: setting system clock to 2024-04-12T18:43:27 UTC (1712947407) Apr 12 18:43:28.101704 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Apr 12 18:43:28.101714 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:43:28.101721 kernel: Segment Routing with IPv6 Apr 12 18:43:28.101728 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:43:28.101735 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:43:28.101743 kernel: Key type dns_resolver registered Apr 12 18:43:28.101750 kernel: IPI shorthand broadcast: enabled Apr 12 18:43:28.101757 kernel: sched_clock: Marking stable (521348508, 110867539)->(660201229, -27985182) Apr 12 18:43:28.101766 kernel: registered taskstats version 1 Apr 12 18:43:28.101774 kernel: Loading compiled-in X.509 certificates Apr 12 18:43:28.101781 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:43:28.101789 kernel: Key type .fscrypt registered Apr 12 18:43:28.101796 kernel: Key type fscrypt-provisioning registered Apr 12 18:43:28.101803 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:43:28.101811 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:43:28.101818 kernel: ima: No architecture policies found Apr 12 18:43:28.101827 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:43:28.101834 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:43:28.101842 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:43:28.101849 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:43:28.101856 kernel: Run /init as init process Apr 12 18:43:28.101863 kernel: with arguments: Apr 12 18:43:28.101870 kernel: /init Apr 12 18:43:28.101878 kernel: with environment: Apr 12 18:43:28.101895 kernel: HOME=/ Apr 12 18:43:28.101904 kernel: TERM=linux Apr 12 18:43:28.101912 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:43:28.101922 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:43:28.101933 systemd[1]: Detected virtualization kvm. Apr 12 18:43:28.101941 systemd[1]: Detected architecture x86-64. Apr 12 18:43:28.101949 systemd[1]: Running in initrd. Apr 12 18:43:28.101956 systemd[1]: No hostname configured, using default hostname. Apr 12 18:43:28.101966 systemd[1]: Hostname set to . Apr 12 18:43:28.101974 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:43:28.101982 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:43:28.101990 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:43:28.101998 systemd[1]: Reached target cryptsetup.target. Apr 12 18:43:28.102005 systemd[1]: Reached target paths.target. Apr 12 18:43:28.102013 systemd[1]: Reached target slices.target. Apr 12 18:43:28.102021 systemd[1]: Reached target swap.target. Apr 12 18:43:28.102029 systemd[1]: Reached target timers.target. Apr 12 18:43:28.102038 systemd[1]: Listening on iscsid.socket. Apr 12 18:43:28.102046 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:43:28.102054 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:43:28.102062 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:43:28.102070 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:43:28.102078 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:43:28.102086 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:43:28.102095 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:43:28.102103 systemd[1]: Reached target sockets.target. Apr 12 18:43:28.102111 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:43:28.102118 systemd[1]: Finished network-cleanup.service. Apr 12 18:43:28.102126 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:43:28.102135 systemd[1]: Starting systemd-journald.service... Apr 12 18:43:28.102143 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:43:28.102153 systemd[1]: Starting systemd-resolved.service... Apr 12 18:43:28.102160 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:43:28.102168 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:43:28.102177 kernel: audit: type=1130 audit(1712947408.093:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.102190 systemd-journald[197]: Journal started Apr 12 18:43:28.102237 systemd-journald[197]: Runtime Journal (/run/log/journal/7ec81455cc164a09a50955ed4ebc18ce) is 6.0M, max 48.5M, 42.5M free. Apr 12 18:43:28.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.097934 systemd-modules-load[198]: Inserted module 'overlay' Apr 12 18:43:28.141538 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:43:28.141564 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:43:28.118442 systemd-resolved[199]: Positive Trust Anchors: Apr 12 18:43:28.144463 kernel: Bridge firewalling registered Apr 12 18:43:28.144478 systemd[1]: Started systemd-journald.service. Apr 12 18:43:28.118456 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:43:28.118496 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:43:28.121167 systemd-resolved[199]: Defaulting to hostname 'linux'. Apr 12 18:43:28.143746 systemd-modules-load[198]: Inserted module 'br_netfilter' Apr 12 18:43:28.147515 systemd[1]: Started systemd-resolved.service. Apr 12 18:43:28.159800 kernel: audit: type=1130 audit(1712947408.141:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.159817 kernel: audit: type=1130 audit(1712947408.147:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.169349 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:43:28.174654 kernel: audit: type=1130 audit(1712947408.168:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.174671 kernel: SCSI subsystem initialized Apr 12 18:43:28.174680 kernel: audit: type=1130 audit(1712947408.174:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.174830 systemd[1]: Reached target nss-lookup.target. Apr 12 18:43:28.186102 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:43:28.186825 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:43:28.187183 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:43:28.189659 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:43:28.191069 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:43:28.192195 systemd-modules-load[198]: Inserted module 'dm_multipath' Apr 12 18:43:28.196119 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:43:28.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.198106 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:43:28.206136 kernel: audit: type=1130 audit(1712947408.197:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.206171 kernel: audit: type=1130 audit(1712947408.202:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.207826 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:43:28.214368 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:43:28.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.216218 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:43:28.219362 kernel: audit: type=1130 audit(1712947408.215:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.221602 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:43:28.225150 kernel: audit: type=1130 audit(1712947408.220:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.231842 dracut-cmdline[220]: dracut-dracut-053 Apr 12 18:43:28.234855 dracut-cmdline[220]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:43:28.303349 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:43:28.321366 kernel: iscsi: registered transport (tcp) Apr 12 18:43:28.343353 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:43:28.343402 kernel: QLogic iSCSI HBA Driver Apr 12 18:43:28.377212 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:43:28.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.379631 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:43:28.433367 kernel: raid6: avx2x4 gen() 29789 MB/s Apr 12 18:43:28.456347 kernel: raid6: avx2x4 xor() 7200 MB/s Apr 12 18:43:28.473345 kernel: raid6: avx2x2 gen() 31555 MB/s Apr 12 18:43:28.490348 kernel: raid6: avx2x2 xor() 18667 MB/s Apr 12 18:43:28.507353 kernel: raid6: avx2x1 gen() 26273 MB/s Apr 12 18:43:28.524375 kernel: raid6: avx2x1 xor() 13861 MB/s Apr 12 18:43:28.541377 kernel: raid6: sse2x4 gen() 13555 MB/s Apr 12 18:43:28.558376 kernel: raid6: sse2x4 xor() 6667 MB/s Apr 12 18:43:28.575367 kernel: raid6: sse2x2 gen() 15572 MB/s Apr 12 18:43:28.592376 kernel: raid6: sse2x2 xor() 7485 MB/s Apr 12 18:43:28.611392 kernel: raid6: sse2x1 gen() 10262 MB/s Apr 12 18:43:28.628847 kernel: raid6: sse2x1 xor() 7589 MB/s Apr 12 18:43:28.628937 kernel: raid6: using algorithm avx2x2 gen() 31555 MB/s Apr 12 18:43:28.628948 kernel: raid6: .... xor() 18667 MB/s, rmw enabled Apr 12 18:43:28.629606 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:43:28.642359 kernel: xor: automatically using best checksumming function avx Apr 12 18:43:28.733354 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:43:28.742623 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:43:28.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.744000 audit: BPF prog-id=7 op=LOAD Apr 12 18:43:28.744000 audit: BPF prog-id=8 op=LOAD Apr 12 18:43:28.745186 systemd[1]: Starting systemd-udevd.service... Apr 12 18:43:28.757334 systemd-udevd[397]: Using default interface naming scheme 'v252'. Apr 12 18:43:28.761372 systemd[1]: Started systemd-udevd.service. Apr 12 18:43:28.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.765991 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:43:28.776025 dracut-pre-trigger[412]: rd.md=0: removing MD RAID activation Apr 12 18:43:28.805062 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:43:28.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.806794 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:43:28.848086 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:43:28.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:28.874365 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:43:28.924106 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Apr 12 18:43:28.924500 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:43:28.924513 kernel: AES CTR mode by8 optimization enabled Apr 12 18:43:28.925347 kernel: libata version 3.00 loaded. Apr 12 18:43:28.926370 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:43:28.926392 kernel: GPT:9289727 != 19775487 Apr 12 18:43:28.926401 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:43:28.926410 kernel: GPT:9289727 != 19775487 Apr 12 18:43:28.926418 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:43:28.926426 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:43:28.929420 kernel: ata_piix 0000:00:01.1: version 2.13 Apr 12 18:43:28.931346 kernel: scsi host0: ata_piix Apr 12 18:43:28.931490 kernel: scsi host1: ata_piix Apr 12 18:43:28.941985 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:43:28.947800 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Apr 12 18:43:28.947823 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Apr 12 18:43:28.953406 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (460) Apr 12 18:43:28.950235 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:43:28.955943 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:43:28.963602 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:43:28.973447 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:43:28.975993 systemd[1]: Starting disk-uuid.service... Apr 12 18:43:29.052723 disk-uuid[517]: Primary Header is updated. Apr 12 18:43:29.052723 disk-uuid[517]: Secondary Entries is updated. Apr 12 18:43:29.052723 disk-uuid[517]: Secondary Header is updated. Apr 12 18:43:29.060437 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:43:29.065346 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:43:29.100432 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Apr 12 18:43:29.103349 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Apr 12 18:43:29.146726 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Apr 12 18:43:29.146925 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:43:29.164422 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Apr 12 18:43:30.067368 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:43:30.067783 disk-uuid[518]: The operation has completed successfully. Apr 12 18:43:30.091064 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:43:30.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.091186 systemd[1]: Finished disk-uuid.service. Apr 12 18:43:30.105115 systemd[1]: Starting verity-setup.service... Apr 12 18:43:30.126348 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Apr 12 18:43:30.148873 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:43:30.151014 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:43:30.153411 systemd[1]: Finished verity-setup.service. Apr 12 18:43:30.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.232343 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:43:30.232453 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:43:30.233090 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:43:30.233916 systemd[1]: Starting ignition-setup.service... Apr 12 18:43:30.235344 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:43:30.246786 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:43:30.246818 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:43:30.246828 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:43:30.255371 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:43:30.306985 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:43:30.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.331000 audit: BPF prog-id=9 op=LOAD Apr 12 18:43:30.332997 systemd[1]: Starting systemd-networkd.service... Apr 12 18:43:30.338770 systemd[1]: Finished ignition-setup.service. Apr 12 18:43:30.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.341215 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:43:30.364442 systemd-networkd[701]: lo: Link UP Apr 12 18:43:30.364457 systemd-networkd[701]: lo: Gained carrier Apr 12 18:43:30.365025 systemd-networkd[701]: Enumeration completed Apr 12 18:43:30.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.365302 systemd-networkd[701]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:43:30.366236 systemd[1]: Started systemd-networkd.service. Apr 12 18:43:30.368686 systemd[1]: Reached target network.target. Apr 12 18:43:30.369292 systemd-networkd[701]: eth0: Link UP Apr 12 18:43:30.369297 systemd-networkd[701]: eth0: Gained carrier Apr 12 18:43:30.380589 systemd[1]: Starting iscsiuio.service... Apr 12 18:43:30.449860 systemd[1]: Started iscsiuio.service. Apr 12 18:43:30.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.452792 systemd[1]: Starting iscsid.service... Apr 12 18:43:30.453610 ignition[703]: Ignition 2.14.0 Apr 12 18:43:30.454759 systemd-networkd[701]: eth0: DHCPv4 address 10.0.0.39/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:43:30.453618 ignition[703]: Stage: fetch-offline Apr 12 18:43:30.453727 ignition[703]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:43:30.453736 ignition[703]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:43:30.453882 ignition[703]: parsed url from cmdline: "" Apr 12 18:43:30.460705 iscsid[714]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:43:30.460705 iscsid[714]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:43:30.460705 iscsid[714]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:43:30.460705 iscsid[714]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:43:30.460705 iscsid[714]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:43:30.460705 iscsid[714]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:43:30.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.453885 ignition[703]: no config URL provided Apr 12 18:43:30.463635 systemd[1]: Started iscsid.service. Apr 12 18:43:30.453890 ignition[703]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:43:30.471349 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:43:30.453899 ignition[703]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:43:30.496485 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:43:30.453927 ignition[703]: op(1): [started] loading QEMU firmware config module Apr 12 18:43:30.498906 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:43:30.453933 ignition[703]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 12 18:43:30.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.501564 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:43:30.464447 ignition[703]: op(1): [finished] loading QEMU firmware config module Apr 12 18:43:30.504393 systemd[1]: Reached target remote-fs.target. Apr 12 18:43:30.506585 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:43:30.515951 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:43:30.530494 ignition[703]: parsing config with SHA512: 48c12b7a8abedc307cf8879a03e747d42dcf03dcf8e10c0d674a501d8d4618364c957a7d753037e5abf51c36ae86398366fa4532931c82555ebba2c15c3de8e8 Apr 12 18:43:30.560808 unknown[703]: fetched base config from "system" Apr 12 18:43:30.560825 unknown[703]: fetched user config from "qemu" Apr 12 18:43:30.561424 ignition[703]: fetch-offline: fetch-offline passed Apr 12 18:43:30.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.562589 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:43:30.561501 ignition[703]: Ignition finished successfully Apr 12 18:43:30.563655 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:43:30.564445 systemd[1]: Starting ignition-kargs.service... Apr 12 18:43:30.578106 ignition[731]: Ignition 2.14.0 Apr 12 18:43:30.578117 ignition[731]: Stage: kargs Apr 12 18:43:30.584470 systemd[1]: Finished ignition-kargs.service. Apr 12 18:43:30.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.578269 ignition[731]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:43:30.586511 systemd[1]: Starting ignition-disks.service... Apr 12 18:43:30.578280 ignition[731]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:43:30.579598 ignition[731]: kargs: kargs passed Apr 12 18:43:30.579643 ignition[731]: Ignition finished successfully Apr 12 18:43:30.592559 ignition[737]: Ignition 2.14.0 Apr 12 18:43:30.592571 ignition[737]: Stage: disks Apr 12 18:43:30.592659 ignition[737]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:43:30.592669 ignition[737]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:43:30.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.594268 systemd[1]: Finished ignition-disks.service. Apr 12 18:43:30.593644 ignition[737]: disks: disks passed Apr 12 18:43:30.595667 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:43:30.593677 ignition[737]: Ignition finished successfully Apr 12 18:43:30.597471 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:43:30.620565 systemd[1]: Reached target local-fs.target. Apr 12 18:43:30.622017 systemd[1]: Reached target sysinit.target. Apr 12 18:43:30.622774 systemd[1]: Reached target basic.target. Apr 12 18:43:30.625010 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:43:30.659892 systemd-fsck[745]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 18:43:30.821741 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:43:30.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.823653 systemd[1]: Mounting sysroot.mount... Apr 12 18:43:30.845347 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:43:30.845421 systemd[1]: Mounted sysroot.mount. Apr 12 18:43:30.858421 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:43:30.861046 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:43:30.862764 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:43:30.862801 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:43:30.862822 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:43:30.868015 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:43:30.870060 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:43:30.874942 initrd-setup-root[755]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:43:30.879571 initrd-setup-root[763]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:43:30.883690 initrd-setup-root[771]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:43:30.887543 initrd-setup-root[779]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:43:30.943631 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:43:30.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.944995 systemd[1]: Starting ignition-mount.service... Apr 12 18:43:30.946352 systemd[1]: Starting sysroot-boot.service... Apr 12 18:43:30.951535 bash[796]: umount: /sysroot/usr/share/oem: not mounted. Apr 12 18:43:30.967629 systemd[1]: Finished sysroot-boot.service. Apr 12 18:43:30.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.971108 ignition[797]: INFO : Ignition 2.14.0 Apr 12 18:43:30.971108 ignition[797]: INFO : Stage: mount Apr 12 18:43:30.972616 ignition[797]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:43:30.972616 ignition[797]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:43:30.972616 ignition[797]: INFO : mount: mount passed Apr 12 18:43:30.975607 ignition[797]: INFO : Ignition finished successfully Apr 12 18:43:30.977056 systemd[1]: Finished ignition-mount.service. Apr 12 18:43:30.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:31.162535 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:43:31.169341 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (807) Apr 12 18:43:31.171430 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:43:31.171444 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:43:31.171453 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:43:31.175136 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:43:31.177396 systemd[1]: Starting ignition-files.service... Apr 12 18:43:31.192766 ignition[827]: INFO : Ignition 2.14.0 Apr 12 18:43:31.192766 ignition[827]: INFO : Stage: files Apr 12 18:43:31.194535 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:43:31.194535 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:43:31.197952 ignition[827]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:43:31.199821 ignition[827]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:43:31.199821 ignition[827]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:43:31.203139 ignition[827]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:43:31.203139 ignition[827]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:43:31.206164 unknown[827]: wrote ssh authorized keys file for user: core Apr 12 18:43:31.207393 ignition[827]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:43:31.208828 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:43:31.210991 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:43:31.774615 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:43:32.054910 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:43:32.054910 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:43:32.060008 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:43:32.060008 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:43:32.186525 systemd-networkd[701]: eth0: Gained IPv6LL Apr 12 18:43:32.475895 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:43:32.625998 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:43:32.629202 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:43:32.629202 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:43:32.642990 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:43:32.719724 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:43:33.017956 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Apr 12 18:43:33.021013 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:43:33.021013 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:43:33.021013 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:43:33.076583 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:43:33.996605 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Apr 12 18:43:33.999808 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:43:33.999808 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:43:33.999808 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:43:33.999808 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:43:33.999808 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:43:34.096709 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:43:34.098817 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(10): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(11): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(12): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:43:34.098817 ignition[827]: INFO : files: op(12): op(13): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:43:34.166879 ignition[827]: INFO : files: op(12): op(13): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:43:34.168633 ignition[827]: INFO : files: op(12): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:43:34.170062 ignition[827]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:43:34.170062 ignition[827]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:43:34.170062 ignition[827]: INFO : files: files passed Apr 12 18:43:34.170062 ignition[827]: INFO : Ignition finished successfully Apr 12 18:43:34.179317 systemd[1]: Finished ignition-files.service. Apr 12 18:43:34.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.180834 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:43:34.187182 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 18:43:34.187210 kernel: audit: type=1130 audit(1712947414.179:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.185084 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:43:34.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.185731 systemd[1]: Starting ignition-quench.service... Apr 12 18:43:34.198629 kernel: audit: type=1130 audit(1712947414.190:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.198655 kernel: audit: type=1131 audit(1712947414.190:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.198670 kernel: audit: type=1130 audit(1712947414.198:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.198756 initrd-setup-root-after-ignition[850]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Apr 12 18:43:34.188380 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:43:34.205963 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:43:34.188486 systemd[1]: Finished ignition-quench.service. Apr 12 18:43:34.190708 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:43:34.198735 systemd[1]: Reached target ignition-complete.target. Apr 12 18:43:34.203500 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:43:34.216527 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:43:34.216609 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:43:34.227208 kernel: audit: type=1130 audit(1712947414.218:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.227235 kernel: audit: type=1131 audit(1712947414.218:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.218464 systemd[1]: Reached target initrd-fs.target. Apr 12 18:43:34.227211 systemd[1]: Reached target initrd.target. Apr 12 18:43:34.228053 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:43:34.228773 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:43:34.239362 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:43:34.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.241916 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:43:34.245765 kernel: audit: type=1130 audit(1712947414.240:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.250116 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:43:34.296299 kernel: audit: type=1131 audit(1712947414.251:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.296343 kernel: audit: type=1131 audit(1712947414.256:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.296359 kernel: audit: type=1131 audit(1712947414.262:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.250658 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:43:34.250823 systemd[1]: Stopped target timers.target. Apr 12 18:43:34.298831 ignition[867]: INFO : Ignition 2.14.0 Apr 12 18:43:34.298831 ignition[867]: INFO : Stage: umount Apr 12 18:43:34.298831 ignition[867]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:43:34.298831 ignition[867]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:43:34.298831 ignition[867]: INFO : umount: umount passed Apr 12 18:43:34.298831 ignition[867]: INFO : Ignition finished successfully Apr 12 18:43:34.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.250972 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:43:34.314000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:43:34.251080 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:43:34.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.251438 systemd[1]: Stopped target initrd.target. Apr 12 18:43:34.254752 systemd[1]: Stopped target basic.target. Apr 12 18:43:34.254906 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:43:34.255070 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:43:34.255248 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:43:34.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.255585 systemd[1]: Stopped target remote-fs.target. Apr 12 18:43:34.255747 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:43:34.255928 systemd[1]: Stopped target sysinit.target. Apr 12 18:43:34.256085 systemd[1]: Stopped target local-fs.target. Apr 12 18:43:34.256259 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:43:34.256603 systemd[1]: Stopped target swap.target. Apr 12 18:43:34.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.256774 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:43:34.256870 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:43:34.257186 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:43:34.262249 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:43:34.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.262350 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:43:34.262636 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:43:34.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.262726 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:43:34.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.268988 systemd[1]: Stopped target paths.target. Apr 12 18:43:34.269218 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:43:34.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:34.272374 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:43:34.272672 systemd[1]: Stopped target slices.target. Apr 12 18:43:34.272817 systemd[1]: Stopped target sockets.target. Apr 12 18:43:34.272983 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:43:34.273058 systemd[1]: Closed iscsid.socket. Apr 12 18:43:34.273192 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:43:34.273289 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:43:34.273727 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:43:34.273811 systemd[1]: Stopped ignition-files.service. Apr 12 18:43:34.274895 systemd[1]: Stopping ignition-mount.service... Apr 12 18:43:34.275375 systemd[1]: Stopping iscsiuio.service... Apr 12 18:43:34.275439 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:43:34.275562 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:43:34.276508 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:43:34.276821 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:43:34.276984 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:43:34.277319 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:43:34.277455 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:43:34.282910 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:43:34.282999 systemd[1]: Stopped iscsiuio.service. Apr 12 18:43:34.284686 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:43:34.284775 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:43:34.285218 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:43:34.285306 systemd[1]: Stopped ignition-mount.service. Apr 12 18:43:34.286349 systemd[1]: Stopped target network.target. Apr 12 18:43:34.286409 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:43:34.286436 systemd[1]: Closed iscsiuio.socket. Apr 12 18:43:34.286563 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:43:34.286601 systemd[1]: Stopped ignition-disks.service. Apr 12 18:43:34.286772 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:43:34.286801 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:43:34.286965 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:43:34.286991 systemd[1]: Stopped ignition-setup.service. Apr 12 18:43:34.287223 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:43:34.287356 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:43:34.293588 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:43:34.297401 systemd-networkd[701]: eth0: DHCPv6 lease lost Apr 12 18:43:34.379000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:43:34.299162 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:43:34.387042 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). Apr 12 18:43:34.387072 iscsid[714]: iscsid shutting down. Apr 12 18:43:34.299249 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:43:34.301122 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:43:34.301268 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:43:34.307548 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:43:34.307634 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:43:34.309595 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:43:34.309621 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:43:34.311003 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:43:34.311039 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:43:34.313349 systemd[1]: Stopping network-cleanup.service... Apr 12 18:43:34.314469 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:43:34.314556 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:43:34.314873 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:43:34.314908 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:43:34.316201 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:43:34.316234 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:43:34.317950 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:43:34.319928 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:43:34.323419 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:43:34.323510 systemd[1]: Stopped network-cleanup.service. Apr 12 18:43:34.328152 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:43:34.328262 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:43:34.330573 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:43:34.330609 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:43:34.332258 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:43:34.332283 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:43:34.333780 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:43:34.333815 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:43:34.335357 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:43:34.335393 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:43:34.337015 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:43:34.337049 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:43:34.339237 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:43:34.340440 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:43:34.340497 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:43:34.344875 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:43:34.344949 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:43:34.346875 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:43:34.349254 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:43:34.365349 systemd[1]: Switching root. Apr 12 18:43:34.392903 systemd-journald[197]: Journal stopped Apr 12 18:43:38.072180 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:43:38.072231 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:43:38.072242 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:43:38.072252 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:43:38.072263 kernel: SELinux: policy capability open_perms=1 Apr 12 18:43:38.072275 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:43:38.072289 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:43:38.072301 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:43:38.072312 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:43:38.072334 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:43:38.072344 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:43:38.072354 systemd[1]: Successfully loaded SELinux policy in 43.511ms. Apr 12 18:43:38.072372 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.779ms. Apr 12 18:43:38.072384 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:43:38.072396 systemd[1]: Detected virtualization kvm. Apr 12 18:43:38.072407 systemd[1]: Detected architecture x86-64. Apr 12 18:43:38.072426 systemd[1]: Detected first boot. Apr 12 18:43:38.072437 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:43:38.072447 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:43:38.072458 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:43:38.072470 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:43:38.072481 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:43:38.072493 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:43:38.072504 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:43:38.072517 systemd[1]: Stopped iscsid.service. Apr 12 18:43:38.072529 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:43:38.072539 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:43:38.072550 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:43:38.072563 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:43:38.072574 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:43:38.072585 systemd[1]: Created slice system-getty.slice. Apr 12 18:43:38.072595 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:43:38.072605 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:43:38.072616 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:43:38.072626 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:43:38.072637 systemd[1]: Created slice user.slice. Apr 12 18:43:38.072647 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:43:38.072660 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:43:38.072671 systemd[1]: Set up automount boot.automount. Apr 12 18:43:38.072681 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:43:38.072691 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:43:38.072702 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:43:38.072712 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:43:38.072722 systemd[1]: Reached target integritysetup.target. Apr 12 18:43:38.072733 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:43:38.072747 systemd[1]: Reached target remote-fs.target. Apr 12 18:43:38.072758 systemd[1]: Reached target slices.target. Apr 12 18:43:38.072769 systemd[1]: Reached target swap.target. Apr 12 18:43:38.072779 systemd[1]: Reached target torcx.target. Apr 12 18:43:38.072791 systemd[1]: Reached target veritysetup.target. Apr 12 18:43:38.072804 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:43:38.072815 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:43:38.072825 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:43:38.072836 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:43:38.072847 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:43:38.072858 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:43:38.072869 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:43:38.072879 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:43:38.072889 systemd[1]: Mounting media.mount... Apr 12 18:43:38.072900 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:43:38.072910 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:43:38.072920 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:43:38.072930 systemd[1]: Mounting tmp.mount... Apr 12 18:43:38.072940 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:43:38.072953 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:43:38.072963 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:43:38.072973 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:43:38.072984 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:43:38.072994 systemd[1]: Starting modprobe@drm.service... Apr 12 18:43:38.073005 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:43:38.073024 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:43:38.073036 systemd[1]: Starting modprobe@loop.service... Apr 12 18:43:38.073047 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:43:38.073060 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:43:38.073070 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:43:38.073081 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:43:38.073091 kernel: loop: module loaded Apr 12 18:43:38.073102 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:43:38.073112 systemd[1]: Stopped systemd-journald.service. Apr 12 18:43:38.073122 kernel: fuse: init (API version 7.34) Apr 12 18:43:38.073132 systemd[1]: Starting systemd-journald.service... Apr 12 18:43:38.073142 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:43:38.073154 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:43:38.073164 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:43:38.073176 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:43:38.073189 systemd-journald[990]: Journal started Apr 12 18:43:38.073229 systemd-journald[990]: Runtime Journal (/run/log/journal/7ec81455cc164a09a50955ed4ebc18ce) is 6.0M, max 48.5M, 42.5M free. Apr 12 18:43:34.447000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:43:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:43:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:43:34.721000 audit: BPF prog-id=10 op=LOAD Apr 12 18:43:34.721000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:43:34.721000 audit: BPF prog-id=11 op=LOAD Apr 12 18:43:34.721000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:43:34.751000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:43:34.751000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001d58b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:34.751000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:43:34.754000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:43:34.754000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001d5989 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:34.754000 audit: CWD cwd="/" Apr 12 18:43:34.754000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:34.754000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:34.754000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:43:37.710000 audit: BPF prog-id=12 op=LOAD Apr 12 18:43:37.710000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:43:37.710000 audit: BPF prog-id=13 op=LOAD Apr 12 18:43:37.710000 audit: BPF prog-id=14 op=LOAD Apr 12 18:43:37.711000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:43:37.711000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:43:37.712000 audit: BPF prog-id=15 op=LOAD Apr 12 18:43:37.712000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:43:37.712000 audit: BPF prog-id=16 op=LOAD Apr 12 18:43:37.712000 audit: BPF prog-id=17 op=LOAD Apr 12 18:43:37.712000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:43:37.712000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:43:37.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:37.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:37.782000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:43:37.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:37.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.056000 audit: BPF prog-id=18 op=LOAD Apr 12 18:43:38.056000 audit: BPF prog-id=19 op=LOAD Apr 12 18:43:38.056000 audit: BPF prog-id=20 op=LOAD Apr 12 18:43:38.056000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:43:38.056000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:43:38.070000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:43:38.070000 audit[990]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff3521c8f0 a2=4000 a3=7fff3521c98c items=0 ppid=1 pid=990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:38.070000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:43:37.709541 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:43:34.749812 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:43:37.709554 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:43:34.750037 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:43:37.713314 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:43:34.750053 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:43:34.750084 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:43:34.750104 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:43:34.750135 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:43:34.750146 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:43:34.750369 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:43:34.750409 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:43:34.750423 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:43:34.751117 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:43:34.751150 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:43:34.751166 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:43:34.751180 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:43:34.751195 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:43:34.751208 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:43:37.378961 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:37Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:43:37.379244 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:37Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:43:37.379401 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:37Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:43:37.379596 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:37Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:43:37.379642 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:37Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:43:37.379710 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:43:37Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:43:38.125615 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:43:38.126465 systemd[1]: Stopped verity-setup.service. Apr 12 18:43:38.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.157346 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:43:38.159950 systemd[1]: Started systemd-journald.service. Apr 12 18:43:38.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.160493 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:43:38.161313 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:43:38.162099 systemd[1]: Mounted media.mount. Apr 12 18:43:38.162818 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:43:38.163672 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:43:38.188624 systemd[1]: Mounted tmp.mount. Apr 12 18:43:38.189467 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:43:38.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.190497 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:43:38.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.191500 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:43:38.191613 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:43:38.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.192639 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:43:38.192796 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:43:38.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.193794 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:43:38.193977 systemd[1]: Finished modprobe@drm.service. Apr 12 18:43:38.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.194948 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:43:38.195128 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:43:38.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.196224 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:43:38.197229 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:43:38.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.198220 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:43:38.198338 systemd[1]: Finished modprobe@loop.service. Apr 12 18:43:38.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.199357 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:43:38.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.200482 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:43:38.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.201569 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:43:38.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.202598 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:43:38.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.203830 systemd[1]: Reached target network-pre.target. Apr 12 18:43:38.205888 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:43:38.207818 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:43:38.208703 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:43:38.210048 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:43:38.213532 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:43:38.214561 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:43:38.215561 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:43:38.216648 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:43:38.217971 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:43:38.264886 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:43:38.329492 systemd-journald[990]: Time spent on flushing to /var/log/journal/7ec81455cc164a09a50955ed4ebc18ce is 13.602ms for 1107 entries. Apr 12 18:43:38.329492 systemd-journald[990]: System Journal (/var/log/journal/7ec81455cc164a09a50955ed4ebc18ce) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:43:38.787287 systemd-journald[990]: Received client request to flush runtime journal. Apr 12 18:43:38.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:38.327641 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:43:38.787822 udevadm[1004]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:43:38.330990 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:43:38.332078 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:43:38.365727 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:43:38.366938 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:43:38.609142 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:43:38.643224 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:43:38.788400 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:43:38.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.150602 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:43:39.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.152000 audit: BPF prog-id=21 op=LOAD Apr 12 18:43:39.152000 audit: BPF prog-id=22 op=LOAD Apr 12 18:43:39.152000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:43:39.152000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:43:39.153078 systemd[1]: Starting systemd-udevd.service... Apr 12 18:43:39.169239 systemd-udevd[1007]: Using default interface naming scheme 'v252'. Apr 12 18:43:39.182382 systemd[1]: Started systemd-udevd.service. Apr 12 18:43:39.193922 kernel: kauditd_printk_skb: 104 callbacks suppressed Apr 12 18:43:39.194082 kernel: audit: type=1130 audit(1712947419.183:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.194514 kernel: audit: type=1334 audit(1712947419.188:142): prog-id=23 op=LOAD Apr 12 18:43:39.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.188000 audit: BPF prog-id=23 op=LOAD Apr 12 18:43:39.189084 systemd[1]: Starting systemd-networkd.service... Apr 12 18:43:39.201366 kernel: audit: type=1334 audit(1712947419.195:143): prog-id=24 op=LOAD Apr 12 18:43:39.201459 kernel: audit: type=1334 audit(1712947419.197:144): prog-id=25 op=LOAD Apr 12 18:43:39.201510 kernel: audit: type=1334 audit(1712947419.198:145): prog-id=26 op=LOAD Apr 12 18:43:39.195000 audit: BPF prog-id=24 op=LOAD Apr 12 18:43:39.197000 audit: BPF prog-id=25 op=LOAD Apr 12 18:43:39.198000 audit: BPF prog-id=26 op=LOAD Apr 12 18:43:39.199591 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:43:39.219304 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:43:39.230775 systemd[1]: Started systemd-userdbd.service. Apr 12 18:43:39.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.236884 kernel: audit: type=1130 audit(1712947419.231:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.254864 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:43:39.258359 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:43:39.265351 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:43:39.276160 systemd-networkd[1026]: lo: Link UP Apr 12 18:43:39.276172 systemd-networkd[1026]: lo: Gained carrier Apr 12 18:43:39.276695 systemd-networkd[1026]: Enumeration completed Apr 12 18:43:39.276871 systemd[1]: Started systemd-networkd.service. Apr 12 18:43:39.277022 systemd-networkd[1026]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:43:39.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.278586 systemd-networkd[1026]: eth0: Link UP Apr 12 18:43:39.278683 systemd-networkd[1026]: eth0: Gained carrier Apr 12 18:43:39.274000 audit[1020]: AVC avc: denied { confidentiality } for pid=1020 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:43:39.285435 kernel: audit: type=1130 audit(1712947419.277:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.285494 kernel: audit: type=1400 audit(1712947419.274:148): avc: denied { confidentiality } for pid=1020 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:43:39.274000 audit[1020]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c149db08c0 a1=32194 a2=7fed3ce94bc5 a3=5 items=108 ppid=1007 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.301836 systemd-networkd[1026]: eth0: DHCPv4 address 10.0.0.39/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:43:39.302732 kernel: audit: type=1300 audit(1712947419.274:148): arch=c000003e syscall=175 success=yes exit=0 a0=55c149db08c0 a1=32194 a2=7fed3ce94bc5 a3=5 items=108 ppid=1007 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.302800 kernel: audit: type=1307 audit(1712947419.274:148): cwd="/" Apr 12 18:43:39.274000 audit: CWD cwd="/" Apr 12 18:43:39.274000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=1 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=2 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=3 name=(null) inode=15509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=4 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=5 name=(null) inode=15510 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=6 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=7 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=8 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=9 name=(null) inode=15512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=10 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=11 name=(null) inode=15513 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=12 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=13 name=(null) inode=15514 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=14 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=15 name=(null) inode=15515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=16 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=17 name=(null) inode=15516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=18 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=19 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=20 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=21 name=(null) inode=15518 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=22 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=23 name=(null) inode=15519 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=24 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=25 name=(null) inode=15520 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=26 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=27 name=(null) inode=15521 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=28 name=(null) inode=15517 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=29 name=(null) inode=15522 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=30 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=31 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=32 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=33 name=(null) inode=15524 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=34 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=35 name=(null) inode=15525 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=36 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=37 name=(null) inode=15526 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=38 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=39 name=(null) inode=15527 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=40 name=(null) inode=15523 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=41 name=(null) inode=15528 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=42 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=43 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=44 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=45 name=(null) inode=15530 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=46 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=47 name=(null) inode=15531 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=48 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=49 name=(null) inode=15532 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=50 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=51 name=(null) inode=15533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=52 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=53 name=(null) inode=15534 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.308394 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 18:43:39.274000 audit: PATH item=55 name=(null) inode=15535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=56 name=(null) inode=15535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=57 name=(null) inode=15536 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=58 name=(null) inode=15535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=59 name=(null) inode=15537 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=60 name=(null) inode=15535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=61 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=62 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=63 name=(null) inode=15539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=64 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=65 name=(null) inode=15540 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=66 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=67 name=(null) inode=15541 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=68 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=69 name=(null) inode=15542 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=70 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=71 name=(null) inode=15543 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=72 name=(null) inode=15535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=73 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=74 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=75 name=(null) inode=15545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=76 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=77 name=(null) inode=15546 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=78 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=79 name=(null) inode=15547 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=80 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=81 name=(null) inode=15548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=82 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=83 name=(null) inode=15549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=84 name=(null) inode=15535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=85 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=86 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=87 name=(null) inode=15551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=88 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=89 name=(null) inode=15552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=90 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=91 name=(null) inode=15553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=92 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=93 name=(null) inode=15554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=94 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=95 name=(null) inode=15555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=96 name=(null) inode=15535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=97 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=98 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=99 name=(null) inode=15557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=100 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=101 name=(null) inode=15558 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=102 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=103 name=(null) inode=15559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=104 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=105 name=(null) inode=15560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=106 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PATH item=107 name=(null) inode=15561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:39.274000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:43:39.317341 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:43:39.319342 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Apr 12 18:43:39.435521 kernel: kvm: Nested Virtualization enabled Apr 12 18:43:39.435646 kernel: SVM: kvm: Nested Paging enabled Apr 12 18:43:39.435672 kernel: SVM: Virtual VMLOAD VMSAVE supported Apr 12 18:43:39.436836 kernel: SVM: Virtual GIF supported Apr 12 18:43:39.453352 kernel: EDAC MC: Ver: 3.0.0 Apr 12 18:43:39.472642 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:43:39.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.474657 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:43:39.484588 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:43:39.507872 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:43:39.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.508926 systemd[1]: Reached target cryptsetup.target. Apr 12 18:43:39.510746 systemd[1]: Starting lvm2-activation.service... Apr 12 18:43:39.513902 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:43:39.539942 systemd[1]: Finished lvm2-activation.service. Apr 12 18:43:39.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.540906 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:43:39.541789 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:43:39.541812 systemd[1]: Reached target local-fs.target. Apr 12 18:43:39.542653 systemd[1]: Reached target machines.target. Apr 12 18:43:39.544406 systemd[1]: Starting ldconfig.service... Apr 12 18:43:39.545385 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:43:39.545418 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:43:39.546185 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:43:39.547993 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:43:39.550825 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:43:39.552020 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:43:39.552054 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:43:39.552898 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:43:39.554185 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) Apr 12 18:43:39.555265 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:43:39.566557 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:43:39.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.575830 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:43:39.587921 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:43:39.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:39.592934 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:43:39.631168 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Apr 12 18:43:39.631168 systemd-fsck[1055]: /dev/vda1: 789 files, 119240/258078 clusters Apr 12 18:43:39.607631 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:43:39.610904 systemd[1]: Mounting boot.mount... Apr 12 18:43:39.625174 systemd[1]: Mounted boot.mount. Apr 12 18:43:40.125096 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:43:40.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:40.158564 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:43:40.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:40.190023 systemd[1]: Starting audit-rules.service... Apr 12 18:43:40.191929 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:43:40.195578 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:43:40.197000 audit: BPF prog-id=27 op=LOAD Apr 12 18:43:40.198507 systemd[1]: Starting systemd-resolved.service... Apr 12 18:43:40.199000 audit: BPF prog-id=28 op=LOAD Apr 12 18:43:40.201125 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:43:40.203086 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:43:40.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:40.614707 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:43:40.616817 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:43:40.620000 audit[1070]: SYSTEM_BOOT pid=1070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:43:40.622711 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:43:40.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:40.624793 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:43:40.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:40.625930 systemd[1]: Reached target time-set.target. Apr 12 18:43:40.629072 systemd-timesyncd[1069]: Contacted time server 10.0.0.1:123 (10.0.0.1). Apr 12 18:43:40.629543 systemd-timesyncd[1069]: Initial clock synchronization to Fri 2024-04-12 18:43:40.672034 UTC. Apr 12 18:43:40.629577 systemd-resolved[1068]: Positive Trust Anchors: Apr 12 18:43:40.629588 systemd-resolved[1068]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:43:40.629621 systemd-resolved[1068]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:43:40.631000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:43:40.631000 audit[1080]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb542f450 a2=420 a3=0 items=0 ppid=1059 pid=1080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:40.631000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:43:40.632581 augenrules[1080]: No rules Apr 12 18:43:40.633012 systemd[1]: Finished audit-rules.service. Apr 12 18:43:40.640411 systemd-networkd[1026]: eth0: Gained IPv6LL Apr 12 18:43:40.653800 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:43:40.708873 systemd-resolved[1068]: Defaulting to hostname 'linux'. Apr 12 18:43:40.710271 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:43:40.710547 systemd[1]: Started systemd-resolved.service. Apr 12 18:43:40.711600 systemd[1]: Reached target network.target. Apr 12 18:43:40.712517 systemd[1]: Reached target nss-lookup.target. Apr 12 18:43:40.767786 systemd[1]: Finished ldconfig.service. Apr 12 18:43:40.769887 systemd[1]: Starting systemd-update-done.service... Apr 12 18:43:40.778743 systemd[1]: Finished systemd-update-done.service. Apr 12 18:43:40.779785 systemd[1]: Reached target sysinit.target. Apr 12 18:43:40.780668 systemd[1]: Started motdgen.path. Apr 12 18:43:40.781410 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:43:40.782640 systemd[1]: Started logrotate.timer. Apr 12 18:43:40.783464 systemd[1]: Started mdadm.timer. Apr 12 18:43:40.784173 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:43:40.785029 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:43:40.785053 systemd[1]: Reached target paths.target. Apr 12 18:43:40.785804 systemd[1]: Reached target timers.target. Apr 12 18:43:40.786927 systemd[1]: Listening on dbus.socket. Apr 12 18:43:40.788709 systemd[1]: Starting docker.socket... Apr 12 18:43:40.793168 systemd[1]: Listening on sshd.socket. Apr 12 18:43:40.794087 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:43:40.794470 systemd[1]: Listening on docker.socket. Apr 12 18:43:40.795311 systemd[1]: Reached target sockets.target. Apr 12 18:43:40.796140 systemd[1]: Reached target basic.target. Apr 12 18:43:40.796949 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:43:40.796973 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:43:40.797906 systemd[1]: Starting containerd.service... Apr 12 18:43:40.802655 systemd[1]: Starting dbus.service... Apr 12 18:43:40.804420 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:43:40.806468 systemd[1]: Starting extend-filesystems.service... Apr 12 18:43:40.807497 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:43:40.808492 systemd[1]: Starting motdgen.service... Apr 12 18:43:40.813016 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:43:40.815672 systemd[1]: Starting prepare-critools.service... Apr 12 18:43:40.816108 jq[1091]: false Apr 12 18:43:40.818206 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:43:40.826220 dbus-daemon[1090]: [system] SELinux support is enabled Apr 12 18:43:40.876644 systemd[1]: Starting sshd-keygen.service... Apr 12 18:43:40.880670 extend-filesystems[1092]: Found sr0 Apr 12 18:43:40.882431 extend-filesystems[1092]: Found vda Apr 12 18:43:40.882431 extend-filesystems[1092]: Found vda1 Apr 12 18:43:40.882431 extend-filesystems[1092]: Found vda2 Apr 12 18:43:40.882431 extend-filesystems[1092]: Found vda3 Apr 12 18:43:40.880678 systemd[1]: Starting systemd-logind.service... Apr 12 18:43:40.885633 extend-filesystems[1092]: Found usr Apr 12 18:43:40.885633 extend-filesystems[1092]: Found vda4 Apr 12 18:43:40.885633 extend-filesystems[1092]: Found vda6 Apr 12 18:43:40.885633 extend-filesystems[1092]: Found vda7 Apr 12 18:43:40.885633 extend-filesystems[1092]: Found vda9 Apr 12 18:43:40.885633 extend-filesystems[1092]: Checking size of /dev/vda9 Apr 12 18:43:40.882359 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:43:40.882454 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:43:40.887254 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:43:40.890734 systemd[1]: Starting update-engine.service... Apr 12 18:43:40.892802 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:43:40.897746 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:43:40.899547 jq[1113]: true Apr 12 18:43:40.898854 systemd[1]: Started dbus.service. Apr 12 18:43:40.903374 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:43:40.908383 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:43:40.908573 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:43:40.908874 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:43:40.909053 systemd[1]: Finished motdgen.service. Apr 12 18:43:40.913590 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:43:40.913774 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:43:40.920978 jq[1119]: true Apr 12 18:43:40.921631 tar[1115]: ./ Apr 12 18:43:40.921631 tar[1115]: ./loopback Apr 12 18:43:40.922207 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:43:40.922261 systemd[1]: Reached target system-config.target. Apr 12 18:43:40.923619 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:43:40.923643 systemd[1]: Reached target user-config.target. Apr 12 18:43:40.926283 tar[1116]: crictl Apr 12 18:43:40.942626 extend-filesystems[1092]: Resized partition /dev/vda9 Apr 12 18:43:40.986749 extend-filesystems[1130]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:43:40.990637 systemd-logind[1109]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:43:40.990665 systemd-logind[1109]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:43:40.991197 update_engine[1111]: I0412 18:43:40.990538 1111 main.cc:92] Flatcar Update Engine starting Apr 12 18:43:40.995990 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Apr 12 18:43:40.994819 systemd-logind[1109]: New seat seat0. Apr 12 18:43:40.997889 systemd[1]: Started systemd-logind.service. Apr 12 18:43:40.999809 systemd[1]: Started update-engine.service. Apr 12 18:43:41.000134 update_engine[1111]: I0412 18:43:40.999927 1111 update_check_scheduler.cc:74] Next update check in 3m4s Apr 12 18:43:41.004582 systemd[1]: Started locksmithd.service. Apr 12 18:43:41.053357 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Apr 12 18:43:41.231891 extend-filesystems[1130]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:43:41.231891 extend-filesystems[1130]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:43:41.231891 extend-filesystems[1130]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Apr 12 18:43:41.236368 extend-filesystems[1092]: Resized filesystem in /dev/vda9 Apr 12 18:43:41.237358 sshd_keygen[1108]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:43:41.237291 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:43:41.239248 env[1120]: time="2024-04-12T18:43:41.236474842Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:43:41.237451 systemd[1]: Finished extend-filesystems.service. Apr 12 18:43:41.251421 tar[1115]: ./bandwidth Apr 12 18:43:41.253421 bash[1145]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:43:41.253979 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:43:41.264776 env[1120]: time="2024-04-12T18:43:41.264683712Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:43:41.264937 env[1120]: time="2024-04-12T18:43:41.264908969Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:43:41.266568 env[1120]: time="2024-04-12T18:43:41.266530173Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:43:41.266629 env[1120]: time="2024-04-12T18:43:41.266564028Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:43:41.266873 env[1120]: time="2024-04-12T18:43:41.266839683Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:43:41.266933 env[1120]: time="2024-04-12T18:43:41.266870846Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:43:41.266933 env[1120]: time="2024-04-12T18:43:41.266895920Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:43:41.266933 env[1120]: time="2024-04-12T18:43:41.266910627Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:43:41.267069 env[1120]: time="2024-04-12T18:43:41.267036551Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:43:41.267406 env[1120]: time="2024-04-12T18:43:41.267378277Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:43:41.267582 env[1120]: time="2024-04-12T18:43:41.267548402Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:43:41.267639 env[1120]: time="2024-04-12T18:43:41.267580156Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:43:41.267702 env[1120]: time="2024-04-12T18:43:41.267662623Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:43:41.267702 env[1120]: time="2024-04-12T18:43:41.267681659Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:43:41.277363 env[1120]: time="2024-04-12T18:43:41.277179998Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:43:41.277363 env[1120]: time="2024-04-12T18:43:41.277214716Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:43:41.277363 env[1120]: time="2024-04-12T18:43:41.277226870Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:43:41.277363 env[1120]: time="2024-04-12T18:43:41.277270218Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.277363 env[1120]: time="2024-04-12T18:43:41.277294679Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.277363 env[1120]: time="2024-04-12T18:43:41.277311537Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.277623 env[1120]: time="2024-04-12T18:43:41.277382239Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.277623 env[1120]: time="2024-04-12T18:43:41.277401607Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.277623 env[1120]: time="2024-04-12T18:43:41.277418313Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.277623 env[1120]: time="2024-04-12T18:43:41.277431935Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.277623 env[1120]: time="2024-04-12T18:43:41.277443286Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.277623 env[1120]: time="2024-04-12T18:43:41.277454819Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:43:41.277623 env[1120]: time="2024-04-12T18:43:41.277560852Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:43:41.277821 env[1120]: time="2024-04-12T18:43:41.277638155Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.277859091Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.277895396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.277908225Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.277950517Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.277963265Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.277984603Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.277996376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.278007718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.278019160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.278029527Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.278040116Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.278054461Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.278149554Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.278162955Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278761 env[1120]: time="2024-04-12T18:43:41.278173885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.278239 systemd[1]: Finished sshd-keygen.service. Apr 12 18:43:41.282567 env[1120]: time="2024-04-12T18:43:41.278185216Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:43:41.282567 env[1120]: time="2024-04-12T18:43:41.278199341Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:43:41.282567 env[1120]: time="2024-04-12T18:43:41.278230423Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:43:41.282567 env[1120]: time="2024-04-12T18:43:41.278260962Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:43:41.282567 env[1120]: time="2024-04-12T18:43:41.278293831Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:43:41.280746 systemd[1]: Starting issuegen.service... Apr 12 18:43:41.281614 systemd[1]: Started containerd.service. Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.278499628Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.278552349Z" level=info msg="Connect containerd service" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.278584113Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.279046841Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.279694140Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.279731510Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.279765294Z" level=info msg="containerd successfully booted in 0.220453s" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.281272199Z" level=info msg="Start subscribing containerd event" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.281345010Z" level=info msg="Start recovering state" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.281419339Z" level=info msg="Start event monitor" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.281446231Z" level=info msg="Start snapshots syncer" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.281458196Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:43:41.283005 env[1120]: time="2024-04-12T18:43:41.281474772Z" level=info msg="Start streaming server" Apr 12 18:43:41.294341 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:43:41.294522 systemd[1]: Finished issuegen.service. Apr 12 18:43:41.298348 locksmithd[1135]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:43:41.302287 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:43:41.312845 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:43:41.315679 tar[1115]: ./ptp Apr 12 18:43:41.315800 systemd[1]: Started getty@tty1.service. Apr 12 18:43:41.318655 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:43:41.320401 systemd[1]: Reached target getty.target. Apr 12 18:43:41.356612 tar[1115]: ./vlan Apr 12 18:43:41.422452 tar[1115]: ./host-device Apr 12 18:43:41.454623 tar[1115]: ./tuning Apr 12 18:43:41.484050 tar[1115]: ./vrf Apr 12 18:43:41.542622 tar[1115]: ./sbr Apr 12 18:43:41.570379 tar[1115]: ./tap Apr 12 18:43:41.603899 tar[1115]: ./dhcp Apr 12 18:43:41.779872 tar[1115]: ./static Apr 12 18:43:41.806708 tar[1115]: ./firewall Apr 12 18:43:41.850103 systemd[1]: Finished prepare-critools.service. Apr 12 18:43:41.869783 tar[1115]: ./macvlan Apr 12 18:43:41.903480 tar[1115]: ./dummy Apr 12 18:43:41.935590 tar[1115]: ./bridge Apr 12 18:43:41.974119 tar[1115]: ./ipvlan Apr 12 18:43:42.010772 tar[1115]: ./portmap Apr 12 18:43:42.048679 tar[1115]: ./host-local Apr 12 18:43:42.089089 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:43:42.090554 systemd[1]: Reached target multi-user.target. Apr 12 18:43:42.092903 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:43:42.101179 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:43:42.101351 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:43:42.102640 systemd[1]: Startup finished in 929ms (kernel) + 6.486s (initrd) + 7.700s (userspace) = 15.116s. Apr 12 18:43:43.409691 systemd[1]: Created slice system-sshd.slice. Apr 12 18:43:43.410931 systemd[1]: Started sshd@0-10.0.0.39:22-10.0.0.1:41914.service. Apr 12 18:43:43.446474 sshd[1173]: Accepted publickey for core from 10.0.0.1 port 41914 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:43.447858 sshd[1173]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:43.455203 systemd[1]: Created slice user-500.slice. Apr 12 18:43:43.456360 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:43:43.458523 systemd-logind[1109]: New session 1 of user core. Apr 12 18:43:43.463314 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:43:43.464543 systemd[1]: Starting user@500.service... Apr 12 18:43:43.466931 (systemd)[1176]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:43.532198 systemd[1176]: Queued start job for default target default.target. Apr 12 18:43:43.532654 systemd[1176]: Reached target paths.target. Apr 12 18:43:43.532673 systemd[1176]: Reached target sockets.target. Apr 12 18:43:43.532685 systemd[1176]: Reached target timers.target. Apr 12 18:43:43.532695 systemd[1176]: Reached target basic.target. Apr 12 18:43:43.532738 systemd[1176]: Reached target default.target. Apr 12 18:43:43.532761 systemd[1176]: Startup finished in 60ms. Apr 12 18:43:43.532882 systemd[1]: Started user@500.service. Apr 12 18:43:43.534007 systemd[1]: Started session-1.scope. Apr 12 18:43:43.584274 systemd[1]: Started sshd@1-10.0.0.39:22-10.0.0.1:41926.service. Apr 12 18:43:43.618988 sshd[1185]: Accepted publickey for core from 10.0.0.1 port 41926 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:43.620118 sshd[1185]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:43.623388 systemd-logind[1109]: New session 2 of user core. Apr 12 18:43:43.624180 systemd[1]: Started session-2.scope. Apr 12 18:43:43.677413 sshd[1185]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:43.680071 systemd[1]: sshd@1-10.0.0.39:22-10.0.0.1:41926.service: Deactivated successfully. Apr 12 18:43:43.680680 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:43:43.681207 systemd-logind[1109]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:43:43.682415 systemd[1]: Started sshd@2-10.0.0.39:22-10.0.0.1:41934.service. Apr 12 18:43:43.683195 systemd-logind[1109]: Removed session 2. Apr 12 18:43:43.713712 sshd[1191]: Accepted publickey for core from 10.0.0.1 port 41934 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:43.714555 sshd[1191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:43.717814 systemd-logind[1109]: New session 3 of user core. Apr 12 18:43:43.718555 systemd[1]: Started session-3.scope. Apr 12 18:43:43.768178 sshd[1191]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:43.770727 systemd[1]: sshd@2-10.0.0.39:22-10.0.0.1:41934.service: Deactivated successfully. Apr 12 18:43:43.771210 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:43:43.771646 systemd-logind[1109]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:43:43.772563 systemd[1]: Started sshd@3-10.0.0.39:22-10.0.0.1:41946.service. Apr 12 18:43:43.773312 systemd-logind[1109]: Removed session 3. Apr 12 18:43:43.803537 sshd[1198]: Accepted publickey for core from 10.0.0.1 port 41946 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:43.804595 sshd[1198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:43.807775 systemd-logind[1109]: New session 4 of user core. Apr 12 18:43:43.808506 systemd[1]: Started session-4.scope. Apr 12 18:43:43.862432 sshd[1198]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:43.865274 systemd[1]: sshd@3-10.0.0.39:22-10.0.0.1:41946.service: Deactivated successfully. Apr 12 18:43:43.865867 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:43:43.866415 systemd-logind[1109]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:43:43.867506 systemd[1]: Started sshd@4-10.0.0.39:22-10.0.0.1:41958.service. Apr 12 18:43:43.868273 systemd-logind[1109]: Removed session 4. Apr 12 18:43:43.898633 sshd[1204]: Accepted publickey for core from 10.0.0.1 port 41958 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:43.899761 sshd[1204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:43.902954 systemd-logind[1109]: New session 5 of user core. Apr 12 18:43:43.903744 systemd[1]: Started session-5.scope. Apr 12 18:43:43.957655 sudo[1207]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:43:43.957836 sudo[1207]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:43:43.964554 dbus-daemon[1090]: \xd0ͳ\u000b\xe8U: received setenforce notice (enforcing=-1563124672) Apr 12 18:43:43.966422 sudo[1207]: pam_unix(sudo:session): session closed for user root Apr 12 18:43:43.968007 sshd[1204]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:43.970829 systemd[1]: sshd@4-10.0.0.39:22-10.0.0.1:41958.service: Deactivated successfully. Apr 12 18:43:43.971390 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:43:43.971871 systemd-logind[1109]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:43:43.973173 systemd[1]: Started sshd@5-10.0.0.39:22-10.0.0.1:41970.service. Apr 12 18:43:43.973890 systemd-logind[1109]: Removed session 5. Apr 12 18:43:44.004900 sshd[1211]: Accepted publickey for core from 10.0.0.1 port 41970 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:44.006160 sshd[1211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:44.009892 systemd-logind[1109]: New session 6 of user core. Apr 12 18:43:44.010949 systemd[1]: Started session-6.scope. Apr 12 18:43:44.066851 sudo[1215]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:43:44.067084 sudo[1215]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:43:44.070022 sudo[1215]: pam_unix(sudo:session): session closed for user root Apr 12 18:43:44.075620 sudo[1214]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:43:44.075867 sudo[1214]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:43:44.084427 systemd[1]: Stopping audit-rules.service... Apr 12 18:43:44.084000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:43:44.084000 audit[1218]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbb146220 a2=420 a3=0 items=0 ppid=1 pid=1218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:44.084000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:43:44.086145 auditctl[1218]: No rules Apr 12 18:43:44.086416 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:43:44.086597 systemd[1]: Stopped audit-rules.service. Apr 12 18:43:44.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.088245 systemd[1]: Starting audit-rules.service... Apr 12 18:43:44.106197 augenrules[1235]: No rules Apr 12 18:43:44.106915 systemd[1]: Finished audit-rules.service. Apr 12 18:43:44.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.107860 sudo[1214]: pam_unix(sudo:session): session closed for user root Apr 12 18:43:44.106000 audit[1214]: USER_END pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.106000 audit[1214]: CRED_DISP pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.109241 sshd[1211]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:44.108000 audit[1211]: USER_END pid=1211 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:44.108000 audit[1211]: CRED_DISP pid=1211 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:44.111919 systemd[1]: sshd@5-10.0.0.39:22-10.0.0.1:41970.service: Deactivated successfully. Apr 12 18:43:44.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.39:22-10.0.0.1:41970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.112420 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:43:44.112971 systemd-logind[1109]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:43:44.114089 systemd[1]: Started sshd@6-10.0.0.39:22-10.0.0.1:41984.service. Apr 12 18:43:44.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.39:22-10.0.0.1:41984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.114914 systemd-logind[1109]: Removed session 6. Apr 12 18:43:44.146000 audit[1241]: USER_ACCT pid=1241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:44.147962 sshd[1241]: Accepted publickey for core from 10.0.0.1 port 41984 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:44.147000 audit[1241]: CRED_ACQ pid=1241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:44.147000 audit[1241]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa4fa6bb0 a2=3 a3=0 items=0 ppid=1 pid=1241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:44.147000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:44.149081 sshd[1241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:44.152993 systemd-logind[1109]: New session 7 of user core. Apr 12 18:43:44.153822 systemd[1]: Started session-7.scope. Apr 12 18:43:44.155000 audit[1241]: USER_START pid=1241 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:44.157000 audit[1243]: CRED_ACQ pid=1243 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:44.204000 audit[1244]: USER_ACCT pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.204517 sudo[1244]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:43:44.204677 sudo[1244]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:43:44.205677 kernel: kauditd_printk_skb: 143 callbacks suppressed Apr 12 18:43:44.205770 kernel: audit: type=1101 audit(1712947424.204:177): pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.204000 audit[1244]: CRED_REFR pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.214481 kernel: audit: type=1110 audit(1712947424.204:178): pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.214526 kernel: audit: type=1105 audit(1712947424.205:179): pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.205000 audit[1244]: USER_START pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.712234 systemd[1]: Reloading. Apr 12 18:43:44.773044 /usr/lib/systemd/system-generators/torcx-generator[1274]: time="2024-04-12T18:43:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:43:44.773070 /usr/lib/systemd/system-generators/torcx-generator[1274]: time="2024-04-12T18:43:44Z" level=info msg="torcx already run" Apr 12 18:43:44.836577 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:43:44.836597 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:43:44.854450 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.919190 kernel: audit: type=1400 audit(1712947424.911:180): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.919265 kernel: audit: type=1400 audit(1712947424.911:181): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.919300 kernel: audit: type=1400 audit(1712947424.911:182): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.922205 kernel: audit: type=1400 audit(1712947424.911:183): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.928038 kernel: audit: type=1400 audit(1712947424.911:184): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.928070 kernel: audit: type=1400 audit(1712947424.911:185): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933877 kernel: audit: type=1400 audit(1712947424.911:186): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.917000 audit: BPF prog-id=34 op=LOAD Apr 12 18:43:44.917000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.923000 audit: BPF prog-id=35 op=LOAD Apr 12 18:43:44.923000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.929000 audit: BPF prog-id=36 op=LOAD Apr 12 18:43:44.929000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit: BPF prog-id=37 op=LOAD Apr 12 18:43:44.932000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit: BPF prog-id=38 op=LOAD Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.932000 audit: BPF prog-id=39 op=LOAD Apr 12 18:43:44.932000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:43:44.932000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.933000 audit: BPF prog-id=40 op=LOAD Apr 12 18:43:44.934000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit: BPF prog-id=41 op=LOAD Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.934000 audit: BPF prog-id=42 op=LOAD Apr 12 18:43:44.934000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:43:44.934000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit: BPF prog-id=43 op=LOAD Apr 12 18:43:44.936000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit: BPF prog-id=44 op=LOAD Apr 12 18:43:44.936000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit: BPF prog-id=45 op=LOAD Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit: BPF prog-id=46 op=LOAD Apr 12 18:43:44.937000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:43:44.937000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit: BPF prog-id=47 op=LOAD Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:44.938000 audit: BPF prog-id=48 op=LOAD Apr 12 18:43:44.938000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:43:44.938000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:43:44.946923 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:43:44.952987 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:43:44.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.953427 systemd[1]: Reached target network-online.target. Apr 12 18:43:44.954675 systemd[1]: Started kubelet.service. Apr 12 18:43:44.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.967235 systemd[1]: Starting coreos-metadata.service... Apr 12 18:43:44.973219 systemd[1]: coreos-metadata.service: Deactivated successfully. Apr 12 18:43:44.973382 systemd[1]: Finished coreos-metadata.service. Apr 12 18:43:44.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:44.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:45.004134 kubelet[1314]: E0412 18:43:45.004048 1314 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:43:45.005555 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:43:45.005679 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:43:45.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:43:45.192480 systemd[1]: Stopped kubelet.service. Apr 12 18:43:45.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:45.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:45.207469 systemd[1]: Reloading. Apr 12 18:43:45.273296 /usr/lib/systemd/system-generators/torcx-generator[1383]: time="2024-04-12T18:43:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:43:45.273340 /usr/lib/systemd/system-generators/torcx-generator[1383]: time="2024-04-12T18:43:45Z" level=info msg="torcx already run" Apr 12 18:43:45.331756 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:43:45.331774 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:43:45.348587 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.405000 audit: BPF prog-id=49 op=LOAD Apr 12 18:43:45.405000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit: BPF prog-id=50 op=LOAD Apr 12 18:43:45.406000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.406000 audit: BPF prog-id=51 op=LOAD Apr 12 18:43:45.406000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit: BPF prog-id=52 op=LOAD Apr 12 18:43:45.407000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit: BPF prog-id=53 op=LOAD Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.407000 audit: BPF prog-id=54 op=LOAD Apr 12 18:43:45.407000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:43:45.407000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit: BPF prog-id=55 op=LOAD Apr 12 18:43:45.409000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit: BPF prog-id=56 op=LOAD Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.409000 audit: BPF prog-id=57 op=LOAD Apr 12 18:43:45.409000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:43:45.409000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.410000 audit: BPF prog-id=58 op=LOAD Apr 12 18:43:45.411000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit: BPF prog-id=59 op=LOAD Apr 12 18:43:45.411000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit: BPF prog-id=60 op=LOAD Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit: BPF prog-id=61 op=LOAD Apr 12 18:43:45.412000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:43:45.412000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit: BPF prog-id=62 op=LOAD Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.412000 audit: BPF prog-id=63 op=LOAD Apr 12 18:43:45.412000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:43:45.412000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:43:45.424291 systemd[1]: Started kubelet.service. Apr 12 18:43:45.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:45.466358 kubelet[1423]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:43:45.466358 kubelet[1423]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:43:45.466358 kubelet[1423]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:43:45.466778 kubelet[1423]: I0412 18:43:45.466384 1423 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:43:45.808612 kubelet[1423]: I0412 18:43:45.808566 1423 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:43:45.808612 kubelet[1423]: I0412 18:43:45.808601 1423 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:43:45.811319 kubelet[1423]: I0412 18:43:45.811279 1423 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:43:45.813881 kubelet[1423]: I0412 18:43:45.813841 1423 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:43:45.819961 kubelet[1423]: I0412 18:43:45.819927 1423 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:43:45.820146 kubelet[1423]: I0412 18:43:45.820118 1423 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:43:45.820297 kubelet[1423]: I0412 18:43:45.820272 1423 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:43:45.820297 kubelet[1423]: I0412 18:43:45.820296 1423 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:43:45.820488 kubelet[1423]: I0412 18:43:45.820312 1423 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:43:45.820488 kubelet[1423]: I0412 18:43:45.820434 1423 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:43:45.820549 kubelet[1423]: I0412 18:43:45.820516 1423 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:43:45.820549 kubelet[1423]: I0412 18:43:45.820529 1423 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:43:45.820613 kubelet[1423]: I0412 18:43:45.820554 1423 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:43:45.820613 kubelet[1423]: I0412 18:43:45.820574 1423 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:43:45.820668 kubelet[1423]: E0412 18:43:45.820638 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:45.820698 kubelet[1423]: E0412 18:43:45.820691 1423 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:45.821315 kubelet[1423]: I0412 18:43:45.821238 1423 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:43:45.821552 kubelet[1423]: W0412 18:43:45.821531 1423 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:43:45.822034 kubelet[1423]: I0412 18:43:45.822014 1423 server.go:1232] "Started kubelet" Apr 12 18:43:45.822135 kubelet[1423]: I0412 18:43:45.822103 1423 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:43:45.822418 kubelet[1423]: I0412 18:43:45.822397 1423 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:43:45.822466 kubelet[1423]: I0412 18:43:45.822440 1423 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:43:45.821000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.821000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:45.821000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000274f30 a1=c000822798 a2=c000274f00 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.821000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:45.821000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:45.821000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:45.821000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008303c0 a1=c0008227b0 a2=c000274fc0 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.821000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:45.823728 kubelet[1423]: I0412 18:43:45.823021 1423 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:43:45.823728 kubelet[1423]: I0412 18:43:45.823032 1423 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:43:45.823728 kubelet[1423]: I0412 18:43:45.823065 1423 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:43:45.823728 kubelet[1423]: I0412 18:43:45.823142 1423 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:43:45.825398 kubelet[1423]: E0412 18:43:45.824494 1423 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:43:45.825398 kubelet[1423]: E0412 18:43:45.824510 1423 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:43:45.825398 kubelet[1423]: I0412 18:43:45.824537 1423 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:43:45.825398 kubelet[1423]: E0412 18:43:45.825089 1423 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.39\" not found" Apr 12 18:43:45.825398 kubelet[1423]: I0412 18:43:45.825125 1423 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:43:45.825398 kubelet[1423]: I0412 18:43:45.825232 1423 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:43:45.829273 kubelet[1423]: E0412 18:43:45.829252 1423 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.39\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 18:43:45.829391 kubelet[1423]: W0412 18:43:45.829298 1423 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.39" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:43:45.829391 kubelet[1423]: E0412 18:43:45.829337 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.39" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:43:45.829391 kubelet[1423]: W0412 18:43:45.829375 1423 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:43:45.829391 kubelet[1423]: E0412 18:43:45.829387 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:43:45.829524 kubelet[1423]: W0412 18:43:45.829427 1423 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:43:45.829524 kubelet[1423]: E0412 18:43:45.829435 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:43:45.829580 kubelet[1423]: E0412 18:43:45.829491 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb30a3842", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 821997122, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 821997122, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:45.830257 kubelet[1423]: E0412 18:43:45.830201 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb33078a9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 824503977, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 824503977, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:45.858530 kubelet[1423]: I0412 18:43:45.858492 1423 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:43:45.858530 kubelet[1423]: I0412 18:43:45.858519 1423 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:43:45.858921 kubelet[1423]: E0412 18:43:45.858815 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb5279bd6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.39 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857477590, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857477590, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:45.857000 audit[1438]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:45.857000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcdbedbf50 a2=0 a3=7ffcdbedbf3c items=0 ppid=1423 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:43:45.859249 kubelet[1423]: I0412 18:43:45.859046 1423 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:43:45.859861 kubelet[1423]: E0412 18:43:45.859768 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb527d028", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.39 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857490984, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857490984, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:45.858000 audit[1442]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:45.858000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe9afa2980 a2=0 a3=7ffe9afa296c items=0 ppid=1423 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:43:45.860683 kubelet[1423]: E0412 18:43:45.860611 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb527dcf1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.39 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857494257, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857494257, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:45.926984 kubelet[1423]: I0412 18:43:45.926943 1423 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.39" Apr 12 18:43:45.928311 kubelet[1423]: E0412 18:43:45.928267 1423 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.39" Apr 12 18:43:45.928473 kubelet[1423]: E0412 18:43:45.928380 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb5279bd6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.39 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857477590, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 926888832, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb5279bd6" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:45.929436 kubelet[1423]: E0412 18:43:45.929374 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb527d028", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.39 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857490984, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 926897797, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb527d028" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:45.860000 audit[1444]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:45.860000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd80d15850 a2=0 a3=7ffd80d1583c items=0 ppid=1423 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:45.930936 kubelet[1423]: E0412 18:43:45.930636 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb527dcf1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.39 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857494257, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 926903299, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb527dcf1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:45.931000 audit[1450]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:45.931000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffec793afd0 a2=0 a3=7ffec793afbc items=0 ppid=1423 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:45.954071 kubelet[1423]: I0412 18:43:45.954027 1423 policy_none.go:49] "None policy: Start" Apr 12 18:43:45.955126 kubelet[1423]: I0412 18:43:45.955094 1423 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:43:45.955255 kubelet[1423]: I0412 18:43:45.955225 1423 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:43:45.968000 audit[1455]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:45.968000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe74f37710 a2=0 a3=7ffe74f376fc items=0 ppid=1423 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:43:45.970704 kubelet[1423]: I0412 18:43:45.970542 1423 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:43:45.970000 audit[1456]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:45.970000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff956eb970 a2=0 a3=7fff956eb95c items=0 ppid=1423 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:43:45.971541 kubelet[1423]: I0412 18:43:45.971470 1423 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:43:45.971541 kubelet[1423]: I0412 18:43:45.971502 1423 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:43:45.971541 kubelet[1423]: I0412 18:43:45.971529 1423 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:43:45.970000 audit[1457]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:45.970000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd74ed0b70 a2=0 a3=7ffd74ed0b5c items=0 ppid=1423 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:43:45.971766 kubelet[1423]: E0412 18:43:45.971581 1423 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:43:45.971000 audit[1458]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:45.971000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3b15b320 a2=0 a3=7ffd3b15b30c items=0 ppid=1423 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:43:45.973003 kubelet[1423]: W0412 18:43:45.972920 1423 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:43:45.973003 kubelet[1423]: E0412 18:43:45.972942 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:43:45.972000 audit[1459]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:45.972000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff5772c130 a2=0 a3=7fff5772c11c items=0 ppid=1423 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:43:45.972000 audit[1461]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:45.972000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe4585f8b0 a2=0 a3=7ffe4585f89c items=0 ppid=1423 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:43:45.973000 audit[1462]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:45.973000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffde767120 a2=0 a3=7fffde76710c items=0 ppid=1423 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:43:45.973000 audit[1463]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:45.973000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda8f2b2a0 a2=0 a3=7ffda8f2b28c items=0 ppid=1423 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:45.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:43:46.031470 kubelet[1423]: E0412 18:43:46.031395 1423 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.39\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Apr 12 18:43:46.072659 kubelet[1423]: E0412 18:43:46.072502 1423 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:43:46.129950 kubelet[1423]: I0412 18:43:46.129907 1423 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.39" Apr 12 18:43:46.131173 kubelet[1423]: E0412 18:43:46.131143 1423 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.39" Apr 12 18:43:46.131239 kubelet[1423]: E0412 18:43:46.131160 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb5279bd6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.39 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857477590, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 46, 129833919, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb5279bd6" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:46.132138 kubelet[1423]: E0412 18:43:46.132059 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb527d028", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.39 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857490984, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 46, 129843485, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb527d028" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:46.132797 kubelet[1423]: E0412 18:43:46.132747 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb527dcf1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.39 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857494257, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 46, 129854076, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb527dcf1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:46.273718 kubelet[1423]: E0412 18:43:46.273652 1423 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:43:46.433373 kubelet[1423]: E0412 18:43:46.433222 1423 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.39\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Apr 12 18:43:46.532825 kubelet[1423]: I0412 18:43:46.532783 1423 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.39" Apr 12 18:43:46.534170 kubelet[1423]: E0412 18:43:46.534059 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb5279bd6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.39 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857477590, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 46, 532686106, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb5279bd6" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:46.534297 kubelet[1423]: E0412 18:43:46.534186 1423 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.39" Apr 12 18:43:46.535079 kubelet[1423]: E0412 18:43:46.534998 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb527d028", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.39 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857490984, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 46, 532711262, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb527d028" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:46.535882 kubelet[1423]: E0412 18:43:46.535819 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9bb527dcf1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.39 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 45, 857494257, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 46, 532722896, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events "10.0.0.39.17c59c9bb527dcf1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:46.674672 kubelet[1423]: E0412 18:43:46.674606 1423 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:43:46.701690 systemd[1]: Created slice kubepods.slice. Apr 12 18:43:46.706133 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:43:46.708997 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:43:46.719292 kubelet[1423]: I0412 18:43:46.719239 1423 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:43:46.718000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:46.718000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:46.718000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005e0e70 a1=c0007b6d50 a2=c0005e0e40 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:46.718000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:46.719707 kubelet[1423]: I0412 18:43:46.719365 1423 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:43:46.719707 kubelet[1423]: I0412 18:43:46.719600 1423 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:43:46.720310 kubelet[1423]: E0412 18:43:46.720252 1423 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.39\" not found" Apr 12 18:43:46.721639 kubelet[1423]: E0412 18:43:46.721543 1423 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39.17c59c9be897697b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.39", UID:"10.0.0.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 46, 720442747, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 46, 720442747, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:43:46.814080 kubelet[1423]: I0412 18:43:46.814005 1423 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 18:43:46.821155 kubelet[1423]: E0412 18:43:46.821111 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:47.185952 kubelet[1423]: E0412 18:43:47.185813 1423 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.39" not found Apr 12 18:43:47.237242 kubelet[1423]: E0412 18:43:47.237195 1423 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.39\" not found" node="10.0.0.39" Apr 12 18:43:47.335937 kubelet[1423]: I0412 18:43:47.335901 1423 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.39" Apr 12 18:43:47.338954 kubelet[1423]: I0412 18:43:47.338926 1423 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.39" Apr 12 18:43:47.367587 kubelet[1423]: I0412 18:43:47.367554 1423 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 18:43:47.367907 env[1120]: time="2024-04-12T18:43:47.367834972Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:43:47.368280 kubelet[1423]: I0412 18:43:47.368059 1423 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 18:43:47.544000 audit[1244]: USER_END pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:47.544000 audit[1244]: CRED_DISP pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:47.546049 sudo[1244]: pam_unix(sudo:session): session closed for user root Apr 12 18:43:47.547304 sshd[1241]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:47.546000 audit[1241]: USER_END pid=1241 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.547000 audit[1241]: CRED_DISP pid=1241 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.549502 systemd[1]: sshd@6-10.0.0.39:22-10.0.0.1:41984.service: Deactivated successfully. Apr 12 18:43:47.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.39:22-10.0.0.1:41984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:47.550372 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:43:47.550957 systemd-logind[1109]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:43:47.551619 systemd-logind[1109]: Removed session 7. Apr 12 18:43:47.822033 kubelet[1423]: E0412 18:43:47.821870 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:47.822033 kubelet[1423]: I0412 18:43:47.821886 1423 apiserver.go:52] "Watching apiserver" Apr 12 18:43:47.824550 kubelet[1423]: I0412 18:43:47.824506 1423 topology_manager.go:215] "Topology Admit Handler" podUID="188f0aee-0395-47f8-866f-79625777de3b" podNamespace="calico-system" podName="calico-node-kh5bt" Apr 12 18:43:47.824659 kubelet[1423]: I0412 18:43:47.824642 1423 topology_manager.go:215] "Topology Admit Handler" podUID="38945391-b56f-4a64-a843-457433834294" podNamespace="calico-system" podName="csi-node-driver-x7bts" Apr 12 18:43:47.824751 kubelet[1423]: I0412 18:43:47.824731 1423 topology_manager.go:215] "Topology Admit Handler" podUID="5a8fca52-7e49-4b1a-acdb-cb23371a01a0" podNamespace="kube-system" podName="kube-proxy-kwt97" Apr 12 18:43:47.824985 kubelet[1423]: E0412 18:43:47.824954 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:43:47.825619 kubelet[1423]: I0412 18:43:47.825586 1423 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:43:47.829885 systemd[1]: Created slice kubepods-besteffort-pod188f0aee_0395_47f8_866f_79625777de3b.slice. Apr 12 18:43:47.835140 kubelet[1423]: I0412 18:43:47.835068 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-cni-bin-dir\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835140 kubelet[1423]: I0412 18:43:47.835128 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-cni-net-dir\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835140 kubelet[1423]: I0412 18:43:47.835157 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rt48r\" (UniqueName: \"kubernetes.io/projected/188f0aee-0395-47f8-866f-79625777de3b-kube-api-access-rt48r\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835398 kubelet[1423]: I0412 18:43:47.835186 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5a8fca52-7e49-4b1a-acdb-cb23371a01a0-xtables-lock\") pod \"kube-proxy-kwt97\" (UID: \"5a8fca52-7e49-4b1a-acdb-cb23371a01a0\") " pod="kube-system/kube-proxy-kwt97" Apr 12 18:43:47.835398 kubelet[1423]: I0412 18:43:47.835262 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-xtables-lock\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835398 kubelet[1423]: I0412 18:43:47.835314 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-policysync\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835398 kubelet[1423]: I0412 18:43:47.835381 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5a8fca52-7e49-4b1a-acdb-cb23371a01a0-lib-modules\") pod \"kube-proxy-kwt97\" (UID: \"5a8fca52-7e49-4b1a-acdb-cb23371a01a0\") " pod="kube-system/kube-proxy-kwt97" Apr 12 18:43:47.835493 kubelet[1423]: I0412 18:43:47.835439 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gdxbq\" (UniqueName: \"kubernetes.io/projected/5a8fca52-7e49-4b1a-acdb-cb23371a01a0-kube-api-access-gdxbq\") pod \"kube-proxy-kwt97\" (UID: \"5a8fca52-7e49-4b1a-acdb-cb23371a01a0\") " pod="kube-system/kube-proxy-kwt97" Apr 12 18:43:47.835493 kubelet[1423]: I0412 18:43:47.835481 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-lib-modules\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835538 kubelet[1423]: I0412 18:43:47.835514 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/188f0aee-0395-47f8-866f-79625777de3b-node-certs\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835586 kubelet[1423]: I0412 18:43:47.835569 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-flexvol-driver-host\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835644 kubelet[1423]: I0412 18:43:47.835630 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/38945391-b56f-4a64-a843-457433834294-socket-dir\") pod \"csi-node-driver-x7bts\" (UID: \"38945391-b56f-4a64-a843-457433834294\") " pod="calico-system/csi-node-driver-x7bts" Apr 12 18:43:47.835703 kubelet[1423]: I0412 18:43:47.835682 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/38945391-b56f-4a64-a843-457433834294-registration-dir\") pod \"csi-node-driver-x7bts\" (UID: \"38945391-b56f-4a64-a843-457433834294\") " pod="calico-system/csi-node-driver-x7bts" Apr 12 18:43:47.835744 kubelet[1423]: I0412 18:43:47.835716 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/38945391-b56f-4a64-a843-457433834294-kubelet-dir\") pod \"csi-node-driver-x7bts\" (UID: \"38945391-b56f-4a64-a843-457433834294\") " pod="calico-system/csi-node-driver-x7bts" Apr 12 18:43:47.835775 kubelet[1423]: I0412 18:43:47.835745 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c7klx\" (UniqueName: \"kubernetes.io/projected/38945391-b56f-4a64-a843-457433834294-kube-api-access-c7klx\") pod \"csi-node-driver-x7bts\" (UID: \"38945391-b56f-4a64-a843-457433834294\") " pod="calico-system/csi-node-driver-x7bts" Apr 12 18:43:47.835805 kubelet[1423]: I0412 18:43:47.835773 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5a8fca52-7e49-4b1a-acdb-cb23371a01a0-kube-proxy\") pod \"kube-proxy-kwt97\" (UID: \"5a8fca52-7e49-4b1a-acdb-cb23371a01a0\") " pod="kube-system/kube-proxy-kwt97" Apr 12 18:43:47.835833 kubelet[1423]: I0412 18:43:47.835808 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/188f0aee-0395-47f8-866f-79625777de3b-tigera-ca-bundle\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835862 kubelet[1423]: I0412 18:43:47.835848 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-var-run-calico\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835908 kubelet[1423]: I0412 18:43:47.835891 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-var-lib-calico\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835938 kubelet[1423]: I0412 18:43:47.835929 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/188f0aee-0395-47f8-866f-79625777de3b-cni-log-dir\") pod \"calico-node-kh5bt\" (UID: \"188f0aee-0395-47f8-866f-79625777de3b\") " pod="calico-system/calico-node-kh5bt" Apr 12 18:43:47.835986 kubelet[1423]: I0412 18:43:47.835969 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/38945391-b56f-4a64-a843-457433834294-varrun\") pod \"csi-node-driver-x7bts\" (UID: \"38945391-b56f-4a64-a843-457433834294\") " pod="calico-system/csi-node-driver-x7bts" Apr 12 18:43:47.841093 systemd[1]: Created slice kubepods-besteffort-pod5a8fca52_7e49_4b1a_acdb_cb23371a01a0.slice. Apr 12 18:43:47.937761 kubelet[1423]: E0412 18:43:47.937726 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.937761 kubelet[1423]: W0412 18:43:47.937743 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.937943 kubelet[1423]: E0412 18:43:47.937841 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.937992 kubelet[1423]: E0412 18:43:47.937972 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.937992 kubelet[1423]: W0412 18:43:47.937982 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.938071 kubelet[1423]: E0412 18:43:47.937995 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.938190 kubelet[1423]: E0412 18:43:47.938163 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.938190 kubelet[1423]: W0412 18:43:47.938187 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.938290 kubelet[1423]: E0412 18:43:47.938205 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.938472 kubelet[1423]: E0412 18:43:47.938461 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.938472 kubelet[1423]: W0412 18:43:47.938470 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.938561 kubelet[1423]: E0412 18:43:47.938485 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.938740 kubelet[1423]: E0412 18:43:47.938727 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.938740 kubelet[1423]: W0412 18:43:47.938737 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.938829 kubelet[1423]: E0412 18:43:47.938786 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.938962 kubelet[1423]: E0412 18:43:47.938920 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.938962 kubelet[1423]: W0412 18:43:47.938937 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.939060 kubelet[1423]: E0412 18:43:47.939025 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.939193 kubelet[1423]: E0412 18:43:47.939174 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.939193 kubelet[1423]: W0412 18:43:47.939188 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.939274 kubelet[1423]: E0412 18:43:47.939209 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940316 kubelet[1423]: E0412 18:43:47.939453 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940316 kubelet[1423]: W0412 18:43:47.939466 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940316 kubelet[1423]: E0412 18:43:47.939487 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940316 kubelet[1423]: E0412 18:43:47.939646 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940316 kubelet[1423]: W0412 18:43:47.939655 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940316 kubelet[1423]: E0412 18:43:47.939673 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940316 kubelet[1423]: E0412 18:43:47.939820 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940316 kubelet[1423]: W0412 18:43:47.939826 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940316 kubelet[1423]: E0412 18:43:47.939857 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940316 kubelet[1423]: E0412 18:43:47.939960 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940617 kubelet[1423]: W0412 18:43:47.939967 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940617 kubelet[1423]: E0412 18:43:47.940076 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940617 kubelet[1423]: W0412 18:43:47.940082 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940617 kubelet[1423]: E0412 18:43:47.940181 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940617 kubelet[1423]: W0412 18:43:47.940187 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940617 kubelet[1423]: E0412 18:43:47.940206 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940617 kubelet[1423]: E0412 18:43:47.940227 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940617 kubelet[1423]: E0412 18:43:47.940249 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940617 kubelet[1423]: E0412 18:43:47.940361 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940617 kubelet[1423]: W0412 18:43:47.940373 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940879 kubelet[1423]: E0412 18:43:47.940463 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940879 kubelet[1423]: E0412 18:43:47.940576 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940879 kubelet[1423]: W0412 18:43:47.940585 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940879 kubelet[1423]: E0412 18:43:47.940657 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.940879 kubelet[1423]: E0412 18:43:47.940765 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.940879 kubelet[1423]: W0412 18:43:47.940774 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.940879 kubelet[1423]: E0412 18:43:47.940846 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.941032 kubelet[1423]: E0412 18:43:47.940944 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.941032 kubelet[1423]: W0412 18:43:47.940955 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.941032 kubelet[1423]: E0412 18:43:47.941029 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.941154 kubelet[1423]: E0412 18:43:47.941131 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.941154 kubelet[1423]: W0412 18:43:47.941150 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.941356 kubelet[1423]: E0412 18:43:47.941337 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.942312 kubelet[1423]: E0412 18:43:47.941525 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942312 kubelet[1423]: W0412 18:43:47.941535 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.942312 kubelet[1423]: E0412 18:43:47.941598 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.942312 kubelet[1423]: E0412 18:43:47.941719 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942312 kubelet[1423]: W0412 18:43:47.941726 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.942312 kubelet[1423]: E0412 18:43:47.941932 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942312 kubelet[1423]: W0412 18:43:47.941939 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.942312 kubelet[1423]: E0412 18:43:47.942115 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942312 kubelet[1423]: W0412 18:43:47.942120 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.942312 kubelet[1423]: E0412 18:43:47.942256 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942580 kubelet[1423]: W0412 18:43:47.942263 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.942580 kubelet[1423]: E0412 18:43:47.942428 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942580 kubelet[1423]: W0412 18:43:47.942435 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.942580 kubelet[1423]: E0412 18:43:47.942570 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942580 kubelet[1423]: W0412 18:43:47.942575 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.942742 kubelet[1423]: E0412 18:43:47.942707 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942742 kubelet[1423]: W0412 18:43:47.942722 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.942916 kubelet[1423]: E0412 18:43:47.942871 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.942916 kubelet[1423]: W0412 18:43:47.942885 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.943117 kubelet[1423]: E0412 18:43:47.943053 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.943117 kubelet[1423]: W0412 18:43:47.943063 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.943288 kubelet[1423]: E0412 18:43:47.943269 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.943288 kubelet[1423]: W0412 18:43:47.943281 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.943376 kubelet[1423]: E0412 18:43:47.943301 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943376 kubelet[1423]: E0412 18:43:47.943337 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943376 kubelet[1423]: E0412 18:43:47.943360 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943376 kubelet[1423]: E0412 18:43:47.943375 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943463 kubelet[1423]: E0412 18:43:47.943394 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943463 kubelet[1423]: E0412 18:43:47.943415 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943463 kubelet[1423]: E0412 18:43:47.943454 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943529 kubelet[1423]: E0412 18:43:47.943471 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943562 kubelet[1423]: E0412 18:43:47.943362 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943586 kubelet[1423]: E0412 18:43:47.943369 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943627 kubelet[1423]: E0412 18:43:47.943610 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.943653 kubelet[1423]: W0412 18:43:47.943628 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.943680 kubelet[1423]: E0412 18:43:47.943666 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.943936 kubelet[1423]: E0412 18:43:47.943914 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.943936 kubelet[1423]: W0412 18:43:47.943933 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.943983 kubelet[1423]: E0412 18:43:47.943951 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.944139 kubelet[1423]: E0412 18:43:47.944121 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.944139 kubelet[1423]: W0412 18:43:47.944132 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.944191 kubelet[1423]: E0412 18:43:47.944145 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.944406 kubelet[1423]: E0412 18:43:47.944383 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.944406 kubelet[1423]: W0412 18:43:47.944400 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.944457 kubelet[1423]: E0412 18:43:47.944421 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.944656 kubelet[1423]: E0412 18:43:47.944642 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.944656 kubelet[1423]: W0412 18:43:47.944655 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.944731 kubelet[1423]: E0412 18:43:47.944679 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.944898 kubelet[1423]: E0412 18:43:47.944876 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.944898 kubelet[1423]: W0412 18:43:47.944890 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.944944 kubelet[1423]: E0412 18:43:47.944922 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.945111 kubelet[1423]: E0412 18:43:47.945095 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.945111 kubelet[1423]: W0412 18:43:47.945107 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.945183 kubelet[1423]: E0412 18:43:47.945135 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.945389 kubelet[1423]: E0412 18:43:47.945317 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.945389 kubelet[1423]: W0412 18:43:47.945374 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.945457 kubelet[1423]: E0412 18:43:47.945410 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.945596 kubelet[1423]: E0412 18:43:47.945578 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.945641 kubelet[1423]: W0412 18:43:47.945605 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.945675 kubelet[1423]: E0412 18:43:47.945649 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.945839 kubelet[1423]: E0412 18:43:47.945823 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.945839 kubelet[1423]: W0412 18:43:47.945836 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.945906 kubelet[1423]: E0412 18:43:47.945864 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.946029 kubelet[1423]: E0412 18:43:47.946016 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.946029 kubelet[1423]: W0412 18:43:47.946027 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.946102 kubelet[1423]: E0412 18:43:47.946065 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.946250 kubelet[1423]: E0412 18:43:47.946238 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.946250 kubelet[1423]: W0412 18:43:47.946249 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.946354 kubelet[1423]: E0412 18:43:47.946278 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.946516 kubelet[1423]: E0412 18:43:47.946500 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.946516 kubelet[1423]: W0412 18:43:47.946512 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.946600 kubelet[1423]: E0412 18:43:47.946545 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.946721 kubelet[1423]: E0412 18:43:47.946705 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.946721 kubelet[1423]: W0412 18:43:47.946717 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.946787 kubelet[1423]: E0412 18:43:47.946748 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.946923 kubelet[1423]: E0412 18:43:47.946909 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.946923 kubelet[1423]: W0412 18:43:47.946919 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.946996 kubelet[1423]: E0412 18:43:47.946945 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.947104 kubelet[1423]: E0412 18:43:47.947088 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.947104 kubelet[1423]: W0412 18:43:47.947101 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.947169 kubelet[1423]: E0412 18:43:47.947133 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.947479 kubelet[1423]: E0412 18:43:47.947462 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.947479 kubelet[1423]: W0412 18:43:47.947476 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.947555 kubelet[1423]: E0412 18:43:47.947510 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.947658 kubelet[1423]: E0412 18:43:47.947636 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.947658 kubelet[1423]: W0412 18:43:47.947651 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.947810 kubelet[1423]: E0412 18:43:47.947685 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.947841 kubelet[1423]: E0412 18:43:47.947827 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.947841 kubelet[1423]: W0412 18:43:47.947838 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.947924 kubelet[1423]: E0412 18:43:47.947872 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.948062 kubelet[1423]: E0412 18:43:47.948050 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.948062 kubelet[1423]: W0412 18:43:47.948060 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.948111 kubelet[1423]: E0412 18:43:47.948099 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.948212 kubelet[1423]: E0412 18:43:47.948203 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.948240 kubelet[1423]: W0412 18:43:47.948211 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.948240 kubelet[1423]: E0412 18:43:47.948234 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.948449 kubelet[1423]: E0412 18:43:47.948435 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.948449 kubelet[1423]: W0412 18:43:47.948444 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.948517 kubelet[1423]: E0412 18:43:47.948475 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.948608 kubelet[1423]: E0412 18:43:47.948597 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.948608 kubelet[1423]: W0412 18:43:47.948606 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.948665 kubelet[1423]: E0412 18:43:47.948621 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.948805 kubelet[1423]: E0412 18:43:47.948789 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.948805 kubelet[1423]: W0412 18:43:47.948802 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.948850 kubelet[1423]: E0412 18:43:47.948822 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.949019 kubelet[1423]: E0412 18:43:47.949002 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.949019 kubelet[1423]: W0412 18:43:47.949012 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.949092 kubelet[1423]: E0412 18:43:47.949043 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.949194 kubelet[1423]: E0412 18:43:47.949176 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.949194 kubelet[1423]: W0412 18:43:47.949191 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.949239 kubelet[1423]: E0412 18:43:47.949224 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.949416 kubelet[1423]: E0412 18:43:47.949400 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.949416 kubelet[1423]: W0412 18:43:47.949410 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.949477 kubelet[1423]: E0412 18:43:47.949442 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.949569 kubelet[1423]: E0412 18:43:47.949557 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.949569 kubelet[1423]: W0412 18:43:47.949566 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.949613 kubelet[1423]: E0412 18:43:47.949593 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.949737 kubelet[1423]: E0412 18:43:47.949721 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.949737 kubelet[1423]: W0412 18:43:47.949731 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.949813 kubelet[1423]: E0412 18:43:47.949747 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.949910 kubelet[1423]: E0412 18:43:47.949896 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.949910 kubelet[1423]: W0412 18:43:47.949906 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.949956 kubelet[1423]: E0412 18:43:47.949930 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.950080 kubelet[1423]: E0412 18:43:47.950068 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.950080 kubelet[1423]: W0412 18:43:47.950077 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.950129 kubelet[1423]: E0412 18:43:47.950090 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.950291 kubelet[1423]: E0412 18:43:47.950278 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.950291 kubelet[1423]: W0412 18:43:47.950288 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.950382 kubelet[1423]: E0412 18:43:47.950330 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.950471 kubelet[1423]: E0412 18:43:47.950459 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.950505 kubelet[1423]: W0412 18:43:47.950473 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.950505 kubelet[1423]: E0412 18:43:47.950497 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.950629 kubelet[1423]: E0412 18:43:47.950617 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.950629 kubelet[1423]: W0412 18:43:47.950626 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.950675 kubelet[1423]: E0412 18:43:47.950645 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.950768 kubelet[1423]: E0412 18:43:47.950757 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.950768 kubelet[1423]: W0412 18:43:47.950765 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.950816 kubelet[1423]: E0412 18:43:47.950789 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.950991 kubelet[1423]: E0412 18:43:47.950974 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.950991 kubelet[1423]: W0412 18:43:47.950984 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.951059 kubelet[1423]: E0412 18:43:47.951008 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.951165 kubelet[1423]: E0412 18:43:47.951147 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.951165 kubelet[1423]: W0412 18:43:47.951158 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.951242 kubelet[1423]: E0412 18:43:47.951172 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.951454 kubelet[1423]: E0412 18:43:47.951437 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.951454 kubelet[1423]: W0412 18:43:47.951448 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.951523 kubelet[1423]: E0412 18:43:47.951462 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.951668 kubelet[1423]: E0412 18:43:47.951652 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.951668 kubelet[1423]: W0412 18:43:47.951663 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.951743 kubelet[1423]: E0412 18:43:47.951684 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.951913 kubelet[1423]: E0412 18:43:47.951902 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.951913 kubelet[1423]: W0412 18:43:47.951911 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.951979 kubelet[1423]: E0412 18:43:47.951926 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:47.952122 kubelet[1423]: E0412 18:43:47.952111 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:47.952122 kubelet[1423]: W0412 18:43:47.952119 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:47.952175 kubelet[1423]: E0412 18:43:47.952128 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:48.049861 kubelet[1423]: E0412 18:43:48.049817 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:48.049861 kubelet[1423]: W0412 18:43:48.049838 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:48.049861 kubelet[1423]: E0412 18:43:48.049861 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:48.050104 kubelet[1423]: E0412 18:43:48.050083 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:48.050104 kubelet[1423]: W0412 18:43:48.050094 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:48.050180 kubelet[1423]: E0412 18:43:48.050110 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:48.050272 kubelet[1423]: E0412 18:43:48.050257 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:48.050272 kubelet[1423]: W0412 18:43:48.050267 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:48.050272 kubelet[1423]: E0412 18:43:48.050276 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:48.142466 kubelet[1423]: E0412 18:43:48.139804 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:48.142466 kubelet[1423]: W0412 18:43:48.139824 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:48.142466 kubelet[1423]: E0412 18:43:48.139849 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:48.143618 kubelet[1423]: E0412 18:43:48.143489 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:48.143618 kubelet[1423]: W0412 18:43:48.143507 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:48.143618 kubelet[1423]: E0412 18:43:48.143529 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:48.144261 kubelet[1423]: E0412 18:43:48.144249 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:48.144363 kubelet[1423]: W0412 18:43:48.144347 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:48.144467 kubelet[1423]: E0412 18:43:48.144453 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:48.438302 kubelet[1423]: E0412 18:43:48.438129 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:48.438927 env[1120]: time="2024-04-12T18:43:48.438867207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kh5bt,Uid:188f0aee-0395-47f8-866f-79625777de3b,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:48.444017 kubelet[1423]: E0412 18:43:48.443977 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:48.444467 env[1120]: time="2024-04-12T18:43:48.444426074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kwt97,Uid:5a8fca52-7e49-4b1a-acdb-cb23371a01a0,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:48.822560 kubelet[1423]: E0412 18:43:48.822410 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:49.315531 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1724904825.mount: Deactivated successfully. Apr 12 18:43:49.322812 env[1120]: time="2024-04-12T18:43:49.322745165Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:49.325572 env[1120]: time="2024-04-12T18:43:49.325523634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:49.326573 env[1120]: time="2024-04-12T18:43:49.326534016Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:49.328491 env[1120]: time="2024-04-12T18:43:49.328459048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:49.329792 env[1120]: time="2024-04-12T18:43:49.329757221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:49.332615 env[1120]: time="2024-04-12T18:43:49.332565695Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:49.334020 env[1120]: time="2024-04-12T18:43:49.333963635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:49.336960 env[1120]: time="2024-04-12T18:43:49.336901337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:49.383260 env[1120]: time="2024-04-12T18:43:49.383168210Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:49.383410 env[1120]: time="2024-04-12T18:43:49.383264536Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:49.383410 env[1120]: time="2024-04-12T18:43:49.383295052Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:49.383637 env[1120]: time="2024-04-12T18:43:49.383592576Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/875c6dc636cd34a09e65fcab6a77c085278e3e8259be08d532e26bac524ad036 pid=1555 runtime=io.containerd.runc.v2 Apr 12 18:43:49.389669 env[1120]: time="2024-04-12T18:43:49.389583553Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:49.389669 env[1120]: time="2024-04-12T18:43:49.389627927Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:49.389669 env[1120]: time="2024-04-12T18:43:49.389657129Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:49.389953 env[1120]: time="2024-04-12T18:43:49.389900655Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded pid=1569 runtime=io.containerd.runc.v2 Apr 12 18:43:49.404098 systemd[1]: Started cri-containerd-875c6dc636cd34a09e65fcab6a77c085278e3e8259be08d532e26bac524ad036.scope. Apr 12 18:43:49.410107 systemd[1]: Started cri-containerd-93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded.scope. Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427835 kernel: kauditd_printk_skb: 398 callbacks suppressed Apr 12 18:43:49.427891 kernel: audit: type=1400 audit(1712947429.426:552): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.433551 kernel: audit: type=1400 audit(1712947429.426:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.433591 kernel: audit: type=1400 audit(1712947429.426:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.439307 kernel: audit: type=1400 audit(1712947429.426:555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.439355 kernel: audit: type=1400 audit(1712947429.426:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.445074 kernel: audit: type=1400 audit(1712947429.426:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.448060 kernel: audit: type=1400 audit(1712947429.426:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.448096 kernel: audit: type=1400 audit(1712947429.426:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.450897 kernel: audit: type=1400 audit(1712947429.426:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.456750 kernel: audit: type=1400 audit(1712947429.426:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.426000 audit: BPF prog-id=64 op=LOAD Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1555 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356336646336333663643334613039653635666361623661373763 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1555 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356336646336333663643334613039653635666361623661373763 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.427000 audit: BPF prog-id=65 op=LOAD Apr 12 18:43:49.427000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000205140 items=0 ppid=1555 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356336646336333663643334613039653635666361623661373763 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.430000 audit: BPF prog-id=66 op=LOAD Apr 12 18:43:49.430000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000205188 items=0 ppid=1555 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356336646336333663643334613039653635666361623661373763 Apr 12 18:43:49.476000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:43:49.476000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.476000 audit: BPF prog-id=67 op=LOAD Apr 12 18:43:49.476000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000205598 items=0 ppid=1555 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356336646336333663643334613039653635666361623661373763 Apr 12 18:43:49.490507 env[1120]: time="2024-04-12T18:43:49.490462722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kwt97,Uid:5a8fca52-7e49-4b1a-acdb-cb23371a01a0,Namespace:kube-system,Attempt:0,} returns sandbox id \"875c6dc636cd34a09e65fcab6a77c085278e3e8259be08d532e26bac524ad036\"" Apr 12 18:43:49.491362 kubelet[1423]: E0412 18:43:49.491342 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.491000 audit: BPF prog-id=68 op=LOAD Apr 12 18:43:49.492625 env[1120]: time="2024-04-12T18:43:49.492524269Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1569 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933626161656563636564326135646561333762303264323066353166 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1569 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933626161656563636564326135646561333762303264323066353166 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit: BPF prog-id=69 op=LOAD Apr 12 18:43:49.492000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000332a00 items=0 ppid=1569 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933626161656563636564326135646561333762303264323066353166 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit: BPF prog-id=70 op=LOAD Apr 12 18:43:49.492000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000332a48 items=0 ppid=1569 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933626161656563636564326135646561333762303264323066353166 Apr 12 18:43:49.492000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:43:49.492000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:49.492000 audit: BPF prog-id=71 op=LOAD Apr 12 18:43:49.492000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000332e58 items=0 ppid=1569 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933626161656563636564326135646561333762303264323066353166 Apr 12 18:43:49.503645 env[1120]: time="2024-04-12T18:43:49.503583355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kh5bt,Uid:188f0aee-0395-47f8-866f-79625777de3b,Namespace:calico-system,Attempt:0,} returns sandbox id \"93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded\"" Apr 12 18:43:49.504259 kubelet[1423]: E0412 18:43:49.504242 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:49.823443 kubelet[1423]: E0412 18:43:49.823410 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:49.972669 kubelet[1423]: E0412 18:43:49.972637 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:43:50.824246 kubelet[1423]: E0412 18:43:50.824192 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:51.370649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2473925250.mount: Deactivated successfully. Apr 12 18:43:51.825458 kubelet[1423]: E0412 18:43:51.825300 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:51.972667 kubelet[1423]: E0412 18:43:51.972609 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:43:52.330010 env[1120]: time="2024-04-12T18:43:52.329924792Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:52.332110 env[1120]: time="2024-04-12T18:43:52.332072484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:52.333605 env[1120]: time="2024-04-12T18:43:52.333575687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:52.335603 env[1120]: time="2024-04-12T18:43:52.335536421Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:52.336022 env[1120]: time="2024-04-12T18:43:52.335985316Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc\"" Apr 12 18:43:52.337187 env[1120]: time="2024-04-12T18:43:52.337141570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:43:52.338902 env[1120]: time="2024-04-12T18:43:52.338828349Z" level=info msg="CreateContainer within sandbox \"875c6dc636cd34a09e65fcab6a77c085278e3e8259be08d532e26bac524ad036\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:43:52.357029 env[1120]: time="2024-04-12T18:43:52.356939987Z" level=info msg="CreateContainer within sandbox \"875c6dc636cd34a09e65fcab6a77c085278e3e8259be08d532e26bac524ad036\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"253271eea8ccee3f0dc4b829fb93e4938cd4eeff8ad4035f147b4da2f7da5681\"" Apr 12 18:43:52.357727 env[1120]: time="2024-04-12T18:43:52.357655131Z" level=info msg="StartContainer for \"253271eea8ccee3f0dc4b829fb93e4938cd4eeff8ad4035f147b4da2f7da5681\"" Apr 12 18:43:52.386711 systemd[1]: Started cri-containerd-253271eea8ccee3f0dc4b829fb93e4938cd4eeff8ad4035f147b4da2f7da5681.scope. Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001b16b0 a2=3c a3=7fbc43c85f68 items=0 ppid=1555 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333237316565613863636565336630646334623832396662393365 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit: BPF prog-id=72 op=LOAD Apr 12 18:43:52.428000 audit[1637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001b19d8 a2=78 a3=c00039a768 items=0 ppid=1555 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333237316565613863636565336630646334623832396662393365 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit: BPF prog-id=73 op=LOAD Apr 12 18:43:52.428000 audit[1637]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001b1770 a2=78 a3=c00039a7b8 items=0 ppid=1555 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333237316565613863636565336630646334623832396662393365 Apr 12 18:43:52.428000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:43:52.428000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:52.428000 audit: BPF prog-id=74 op=LOAD Apr 12 18:43:52.428000 audit[1637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001b1c30 a2=78 a3=c00039a848 items=0 ppid=1555 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333237316565613863636565336630646334623832396662393365 Apr 12 18:43:52.480882 env[1120]: time="2024-04-12T18:43:52.480826056Z" level=info msg="StartContainer for \"253271eea8ccee3f0dc4b829fb93e4938cd4eeff8ad4035f147b4da2f7da5681\" returns successfully" Apr 12 18:43:52.534000 audit[1690]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.534000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6c4714f0 a2=0 a3=7ffe6c4714dc items=0 ppid=1647 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:43:52.534000 audit[1689]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.534000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7494a260 a2=0 a3=7ffd7494a24c items=0 ppid=1647 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:43:52.535000 audit[1691]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.535000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc38fa6770 a2=0 a3=7ffc38fa675c items=0 ppid=1647 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:43:52.536000 audit[1692]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.536000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd79c5810 a2=0 a3=7ffdd79c57fc items=0 ppid=1647 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:43:52.536000 audit[1693]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.536000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdd089180 a2=0 a3=7ffcdd08916c items=0 ppid=1647 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:43:52.537000 audit[1694]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.537000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffca6a94c0 a2=0 a3=7fffca6a94ac items=0 ppid=1647 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:43:52.636000 audit[1695]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.636000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc3510c1d0 a2=0 a3=7ffc3510c1bc items=0 ppid=1647 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:43:52.639000 audit[1697]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.639000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffca0b607f0 a2=0 a3=7ffca0b607dc items=0 ppid=1647 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:43:52.642000 audit[1700]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.642000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc0bb113e0 a2=0 a3=7ffc0bb113cc items=0 ppid=1647 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:43:52.643000 audit[1701]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.643000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcca257170 a2=0 a3=7ffcca25715c items=0 ppid=1647 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:43:52.646000 audit[1703]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.646000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc81c4da80 a2=0 a3=7ffc81c4da6c items=0 ppid=1647 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:43:52.647000 audit[1704]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.647000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff54ca2740 a2=0 a3=7fff54ca272c items=0 ppid=1647 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:43:52.649000 audit[1706]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.649000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff903610e0 a2=0 a3=7fff903610cc items=0 ppid=1647 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.649000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:43:52.652000 audit[1709]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.652000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8380aef0 a2=0 a3=7ffc8380aedc items=0 ppid=1647 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:43:52.653000 audit[1710]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.653000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9ddea530 a2=0 a3=7ffd9ddea51c items=0 ppid=1647 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:43:52.655000 audit[1712]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.655000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6f664030 a2=0 a3=7fff6f66401c items=0 ppid=1647 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:43:52.656000 audit[1713]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.656000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffceee55ed0 a2=0 a3=7ffceee55ebc items=0 ppid=1647 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:43:52.659000 audit[1715]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.659000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde8f04820 a2=0 a3=7ffde8f0480c items=0 ppid=1647 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:52.662000 audit[1718]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.662000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeac256820 a2=0 a3=7ffeac25680c items=0 ppid=1647 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:52.665000 audit[1721]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.665000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff39f4fb0 a2=0 a3=7ffff39f4f9c items=0 ppid=1647 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:43:52.666000 audit[1722]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.666000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd76e83800 a2=0 a3=7ffd76e837ec items=0 ppid=1647 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:43:52.668000 audit[1724]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.668000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdf2ea0030 a2=0 a3=7ffdf2ea001c items=0 ppid=1647 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:52.690000 audit[1730]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.690000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffcc5eea60 a2=0 a3=7fffcc5eea4c items=0 ppid=1647 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:52.691000 audit[1731]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.691000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc4220110 a2=0 a3=7ffdc42200fc items=0 ppid=1647 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:43:52.692000 audit[1733]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:52.692000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffe1e59900 a2=0 a3=7fffe1e598ec items=0 ppid=1647 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:43:52.710000 audit[1739]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:52.710000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe7ddb4250 a2=0 a3=7ffe7ddb423c items=0 ppid=1647 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:52.721000 audit[1739]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:52.721000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffe7ddb4250 a2=0 a3=7ffe7ddb423c items=0 ppid=1647 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:52.723000 audit[1745]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.723000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc6fc83ea0 a2=0 a3=7ffc6fc83e8c items=0 ppid=1647 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.723000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:43:52.725000 audit[1747]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.725000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde0c440a0 a2=0 a3=7ffde0c4408c items=0 ppid=1647 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:43:52.729000 audit[1750]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.729000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff45a1a530 a2=0 a3=7fff45a1a51c items=0 ppid=1647 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:43:52.730000 audit[1751]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.730000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc28c899d0 a2=0 a3=7ffc28c899bc items=0 ppid=1647 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:43:52.732000 audit[1753]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.732000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe6b4bfc10 a2=0 a3=7ffe6b4bfbfc items=0 ppid=1647 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:43:52.733000 audit[1754]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.733000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2f0a7ff0 a2=0 a3=7ffe2f0a7fdc items=0 ppid=1647 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:43:52.735000 audit[1756]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.735000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed5430d40 a2=0 a3=7ffed5430d2c items=0 ppid=1647 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:43:52.738000 audit[1759]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.738000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe1fef2190 a2=0 a3=7ffe1fef217c items=0 ppid=1647 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:43:52.739000 audit[1760]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.739000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd379aeef0 a2=0 a3=7ffd379aeedc items=0 ppid=1647 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:43:52.741000 audit[1762]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.741000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd231e5f50 a2=0 a3=7ffd231e5f3c items=0 ppid=1647 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:43:52.742000 audit[1763]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.742000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd273326a0 a2=0 a3=7ffd2733268c items=0 ppid=1647 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:43:52.744000 audit[1765]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.744000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf1fa2c90 a2=0 a3=7ffcf1fa2c7c items=0 ppid=1647 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:52.747000 audit[1768]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.747000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc0f4e4b0 a2=0 a3=7ffdc0f4e49c items=0 ppid=1647 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:43:52.750000 audit[1771]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.750000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6a021d90 a2=0 a3=7fff6a021d7c items=0 ppid=1647 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:43:52.751000 audit[1772]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.751000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff9b05a250 a2=0 a3=7fff9b05a23c items=0 ppid=1647 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:43:52.753000 audit[1774]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.753000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd4aee27d0 a2=0 a3=7ffd4aee27bc items=0 ppid=1647 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:52.756000 audit[1777]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.756000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff54767320 a2=0 a3=7fff5476730c items=0 ppid=1647 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:52.757000 audit[1778]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.757000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce6ef77e0 a2=0 a3=7ffce6ef77cc items=0 ppid=1647 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:43:52.759000 audit[1780]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.759000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc2067a550 a2=0 a3=7ffc2067a53c items=0 ppid=1647 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:43:52.760000 audit[1781]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.760000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2cd188d0 a2=0 a3=7ffe2cd188bc items=0 ppid=1647 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:43:52.762000 audit[1783]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.762000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe4eaa200 a2=0 a3=7fffe4eaa1ec items=0 ppid=1647 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:52.764000 audit[1786]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:52.764000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd7043df0 a2=0 a3=7ffcd7043ddc items=0 ppid=1647 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:52.767000 audit[1788]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:43:52.767000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe1924a810 a2=0 a3=7ffe1924a7fc items=0 ppid=1647 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.767000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:52.767000 audit[1788]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:43:52.767000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe1924a810 a2=0 a3=7ffe1924a7fc items=0 ppid=1647 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.767000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:52.825803 kubelet[1423]: E0412 18:43:52.825732 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:53.042040 kubelet[1423]: E0412 18:43:53.041906 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:53.060988 kubelet[1423]: E0412 18:43:53.060917 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.060988 kubelet[1423]: W0412 18:43:53.060950 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.060988 kubelet[1423]: E0412 18:43:53.060978 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.061213 kubelet[1423]: E0412 18:43:53.061154 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.061213 kubelet[1423]: W0412 18:43:53.061162 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.061213 kubelet[1423]: E0412 18:43:53.061174 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.061361 kubelet[1423]: E0412 18:43:53.061349 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.061361 kubelet[1423]: W0412 18:43:53.061360 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.061412 kubelet[1423]: E0412 18:43:53.061375 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.061534 kubelet[1423]: E0412 18:43:53.061521 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.061534 kubelet[1423]: W0412 18:43:53.061530 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.061589 kubelet[1423]: E0412 18:43:53.061539 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.061689 kubelet[1423]: E0412 18:43:53.061676 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.061689 kubelet[1423]: W0412 18:43:53.061685 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.061743 kubelet[1423]: E0412 18:43:53.061695 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.061844 kubelet[1423]: E0412 18:43:53.061831 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.061844 kubelet[1423]: W0412 18:43:53.061840 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.061893 kubelet[1423]: E0412 18:43:53.061848 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.062018 kubelet[1423]: E0412 18:43:53.062009 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.062018 kubelet[1423]: W0412 18:43:53.062017 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.062064 kubelet[1423]: E0412 18:43:53.062027 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.062162 kubelet[1423]: E0412 18:43:53.062154 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.062186 kubelet[1423]: W0412 18:43:53.062161 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.062186 kubelet[1423]: E0412 18:43:53.062169 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.062309 kubelet[1423]: E0412 18:43:53.062301 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.062344 kubelet[1423]: W0412 18:43:53.062309 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.062344 kubelet[1423]: E0412 18:43:53.062317 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.062473 kubelet[1423]: E0412 18:43:53.062464 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.062473 kubelet[1423]: W0412 18:43:53.062471 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.062519 kubelet[1423]: E0412 18:43:53.062482 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.062643 kubelet[1423]: E0412 18:43:53.062622 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.062643 kubelet[1423]: W0412 18:43:53.062635 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.062702 kubelet[1423]: E0412 18:43:53.062644 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.062812 kubelet[1423]: E0412 18:43:53.062801 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.062812 kubelet[1423]: W0412 18:43:53.062810 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.062890 kubelet[1423]: E0412 18:43:53.062819 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.062999 kubelet[1423]: E0412 18:43:53.062985 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.062999 kubelet[1423]: W0412 18:43:53.062994 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.063071 kubelet[1423]: E0412 18:43:53.063004 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.063158 kubelet[1423]: E0412 18:43:53.063147 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.063158 kubelet[1423]: W0412 18:43:53.063156 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.063210 kubelet[1423]: E0412 18:43:53.063164 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.063299 kubelet[1423]: E0412 18:43:53.063291 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.063335 kubelet[1423]: W0412 18:43:53.063299 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.063335 kubelet[1423]: E0412 18:43:53.063307 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.063474 kubelet[1423]: E0412 18:43:53.063465 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.063498 kubelet[1423]: W0412 18:43:53.063474 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.063498 kubelet[1423]: E0412 18:43:53.063483 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.063624 kubelet[1423]: E0412 18:43:53.063616 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.063648 kubelet[1423]: W0412 18:43:53.063623 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.063648 kubelet[1423]: E0412 18:43:53.063632 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.063773 kubelet[1423]: E0412 18:43:53.063765 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.063797 kubelet[1423]: W0412 18:43:53.063773 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.063797 kubelet[1423]: E0412 18:43:53.063781 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.063918 kubelet[1423]: E0412 18:43:53.063909 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.063918 kubelet[1423]: W0412 18:43:53.063916 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.063970 kubelet[1423]: E0412 18:43:53.063924 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.064055 kubelet[1423]: E0412 18:43:53.064047 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.064079 kubelet[1423]: W0412 18:43:53.064054 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.064079 kubelet[1423]: E0412 18:43:53.064062 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.086144 kubelet[1423]: E0412 18:43:53.086098 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.086144 kubelet[1423]: W0412 18:43:53.086123 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.086144 kubelet[1423]: E0412 18:43:53.086147 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.086440 kubelet[1423]: E0412 18:43:53.086398 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.086440 kubelet[1423]: W0412 18:43:53.086416 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.086440 kubelet[1423]: E0412 18:43:53.086446 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.086695 kubelet[1423]: E0412 18:43:53.086674 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.086695 kubelet[1423]: W0412 18:43:53.086682 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.086746 kubelet[1423]: E0412 18:43:53.086696 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.086910 kubelet[1423]: E0412 18:43:53.086887 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.086910 kubelet[1423]: W0412 18:43:53.086900 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.086988 kubelet[1423]: E0412 18:43:53.086917 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.087106 kubelet[1423]: E0412 18:43:53.087094 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.087106 kubelet[1423]: W0412 18:43:53.087103 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.087153 kubelet[1423]: E0412 18:43:53.087117 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.087294 kubelet[1423]: E0412 18:43:53.087283 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.087294 kubelet[1423]: W0412 18:43:53.087293 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.087358 kubelet[1423]: E0412 18:43:53.087306 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.087584 kubelet[1423]: E0412 18:43:53.087558 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.087611 kubelet[1423]: W0412 18:43:53.087580 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.087634 kubelet[1423]: E0412 18:43:53.087612 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.087791 kubelet[1423]: E0412 18:43:53.087782 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.087791 kubelet[1423]: W0412 18:43:53.087790 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.087839 kubelet[1423]: E0412 18:43:53.087804 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.088007 kubelet[1423]: E0412 18:43:53.087998 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.088007 kubelet[1423]: W0412 18:43:53.088005 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.088054 kubelet[1423]: E0412 18:43:53.088019 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.088194 kubelet[1423]: E0412 18:43:53.088182 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.088194 kubelet[1423]: W0412 18:43:53.088189 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.088269 kubelet[1423]: E0412 18:43:53.088202 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.088446 kubelet[1423]: E0412 18:43:53.088432 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.088446 kubelet[1423]: W0412 18:43:53.088444 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.088497 kubelet[1423]: E0412 18:43:53.088461 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.088628 kubelet[1423]: E0412 18:43:53.088616 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:53.088628 kubelet[1423]: W0412 18:43:53.088625 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:53.088682 kubelet[1423]: E0412 18:43:53.088635 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:53.826568 kubelet[1423]: E0412 18:43:53.826515 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:53.925697 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount248606338.mount: Deactivated successfully. Apr 12 18:43:53.972517 kubelet[1423]: E0412 18:43:53.972481 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:43:54.043936 kubelet[1423]: E0412 18:43:54.043891 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:54.072344 kubelet[1423]: E0412 18:43:54.072265 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.072344 kubelet[1423]: W0412 18:43:54.072304 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.072344 kubelet[1423]: E0412 18:43:54.072340 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.072666 kubelet[1423]: E0412 18:43:54.072633 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.072695 kubelet[1423]: W0412 18:43:54.072668 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.072720 kubelet[1423]: E0412 18:43:54.072704 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.072948 kubelet[1423]: E0412 18:43:54.072932 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.072948 kubelet[1423]: W0412 18:43:54.072947 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.073042 kubelet[1423]: E0412 18:43:54.072959 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.073154 kubelet[1423]: E0412 18:43:54.073140 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.073202 kubelet[1423]: W0412 18:43:54.073150 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.073202 kubelet[1423]: E0412 18:43:54.073171 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.073373 kubelet[1423]: E0412 18:43:54.073358 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.073373 kubelet[1423]: W0412 18:43:54.073367 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.073467 kubelet[1423]: E0412 18:43:54.073378 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.073592 kubelet[1423]: E0412 18:43:54.073564 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.073592 kubelet[1423]: W0412 18:43:54.073579 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.073592 kubelet[1423]: E0412 18:43:54.073594 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.073786 kubelet[1423]: E0412 18:43:54.073767 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.073786 kubelet[1423]: W0412 18:43:54.073782 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.073862 kubelet[1423]: E0412 18:43:54.073796 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.074028 kubelet[1423]: E0412 18:43:54.074008 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.074028 kubelet[1423]: W0412 18:43:54.074023 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.074135 kubelet[1423]: E0412 18:43:54.074036 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.074277 kubelet[1423]: E0412 18:43:54.074260 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.074277 kubelet[1423]: W0412 18:43:54.074274 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.074358 kubelet[1423]: E0412 18:43:54.074293 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.074521 kubelet[1423]: E0412 18:43:54.074504 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.074521 kubelet[1423]: W0412 18:43:54.074515 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.074597 kubelet[1423]: E0412 18:43:54.074526 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.074694 kubelet[1423]: E0412 18:43:54.074678 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.074694 kubelet[1423]: W0412 18:43:54.074690 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.074790 kubelet[1423]: E0412 18:43:54.074700 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.074880 kubelet[1423]: E0412 18:43:54.074867 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.074880 kubelet[1423]: W0412 18:43:54.074877 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.074935 kubelet[1423]: E0412 18:43:54.074887 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.075134 kubelet[1423]: E0412 18:43:54.075107 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.075134 kubelet[1423]: W0412 18:43:54.075117 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.075134 kubelet[1423]: E0412 18:43:54.075138 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.075311 kubelet[1423]: E0412 18:43:54.075298 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.075311 kubelet[1423]: W0412 18:43:54.075308 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.075372 kubelet[1423]: E0412 18:43:54.075318 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.075625 kubelet[1423]: E0412 18:43:54.075587 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.075625 kubelet[1423]: W0412 18:43:54.075612 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.075705 kubelet[1423]: E0412 18:43:54.075643 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.075871 kubelet[1423]: E0412 18:43:54.075860 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.075871 kubelet[1423]: W0412 18:43:54.075869 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.075944 kubelet[1423]: E0412 18:43:54.075878 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.076053 kubelet[1423]: E0412 18:43:54.076037 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.076053 kubelet[1423]: W0412 18:43:54.076048 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.076137 kubelet[1423]: E0412 18:43:54.076060 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.076266 kubelet[1423]: E0412 18:43:54.076238 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.076266 kubelet[1423]: W0412 18:43:54.076250 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.076266 kubelet[1423]: E0412 18:43:54.076258 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.076553 kubelet[1423]: E0412 18:43:54.076396 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.076553 kubelet[1423]: W0412 18:43:54.076402 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.076553 kubelet[1423]: E0412 18:43:54.076410 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.076553 kubelet[1423]: E0412 18:43:54.076519 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.076553 kubelet[1423]: W0412 18:43:54.076524 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.076553 kubelet[1423]: E0412 18:43:54.076532 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.092977 kubelet[1423]: E0412 18:43:54.092887 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.092977 kubelet[1423]: W0412 18:43:54.092904 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.092977 kubelet[1423]: E0412 18:43:54.092920 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.093115 kubelet[1423]: E0412 18:43:54.093098 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.093115 kubelet[1423]: W0412 18:43:54.093111 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.093885 kubelet[1423]: E0412 18:43:54.093128 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.093885 kubelet[1423]: E0412 18:43:54.093302 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.093885 kubelet[1423]: W0412 18:43:54.093310 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.093885 kubelet[1423]: E0412 18:43:54.093338 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.093885 kubelet[1423]: E0412 18:43:54.093467 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.093885 kubelet[1423]: W0412 18:43:54.093473 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.093885 kubelet[1423]: E0412 18:43:54.093491 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.093885 kubelet[1423]: E0412 18:43:54.093643 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.093885 kubelet[1423]: W0412 18:43:54.093649 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.093885 kubelet[1423]: E0412 18:43:54.093661 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.094198 kubelet[1423]: E0412 18:43:54.093804 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.094198 kubelet[1423]: W0412 18:43:54.093835 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.094198 kubelet[1423]: E0412 18:43:54.093846 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.094286 kubelet[1423]: E0412 18:43:54.094211 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.094286 kubelet[1423]: W0412 18:43:54.094219 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.094286 kubelet[1423]: E0412 18:43:54.094233 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.094500 kubelet[1423]: E0412 18:43:54.094379 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.094500 kubelet[1423]: W0412 18:43:54.094390 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.094500 kubelet[1423]: E0412 18:43:54.094401 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.094651 kubelet[1423]: E0412 18:43:54.094520 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.094651 kubelet[1423]: W0412 18:43:54.094527 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.094651 kubelet[1423]: E0412 18:43:54.094535 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.094728 kubelet[1423]: E0412 18:43:54.094702 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.094728 kubelet[1423]: W0412 18:43:54.094708 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.094728 kubelet[1423]: E0412 18:43:54.094716 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.094863 kubelet[1423]: E0412 18:43:54.094842 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.094863 kubelet[1423]: W0412 18:43:54.094852 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.094863 kubelet[1423]: E0412 18:43:54.094862 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.095157 kubelet[1423]: E0412 18:43:54.095129 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:54.095157 kubelet[1423]: W0412 18:43:54.095139 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:54.095157 kubelet[1423]: E0412 18:43:54.095160 1423 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:54.827221 kubelet[1423]: E0412 18:43:54.827177 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:55.827638 kubelet[1423]: E0412 18:43:55.827566 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:55.972753 kubelet[1423]: E0412 18:43:55.972699 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:43:56.827792 kubelet[1423]: E0412 18:43:56.827714 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:57.828137 kubelet[1423]: E0412 18:43:57.828074 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:57.972903 kubelet[1423]: E0412 18:43:57.972840 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:43:58.829196 kubelet[1423]: E0412 18:43:58.829132 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:59.830057 kubelet[1423]: E0412 18:43:59.829970 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:43:59.972474 kubelet[1423]: E0412 18:43:59.972402 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:44:00.830213 kubelet[1423]: E0412 18:44:00.830155 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:01.008705 env[1120]: time="2024-04-12T18:44:01.008646412Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:01.060594 env[1120]: time="2024-04-12T18:44:01.060531820Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:01.182269 env[1120]: time="2024-04-12T18:44:01.182169426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:01.241630 env[1120]: time="2024-04-12T18:44:01.241595738Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:01.242560 env[1120]: time="2024-04-12T18:44:01.242533278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:44:01.243996 env[1120]: time="2024-04-12T18:44:01.243962435Z" level=info msg="CreateContainer within sandbox \"93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:44:01.262700 env[1120]: time="2024-04-12T18:44:01.262654861Z" level=info msg="CreateContainer within sandbox \"93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fd7daddf6f8efaaa71e21d71b32a4a73c7ae93ac71e66b1e685e05015c8c26b9\"" Apr 12 18:44:01.263253 env[1120]: time="2024-04-12T18:44:01.263196657Z" level=info msg="StartContainer for \"fd7daddf6f8efaaa71e21d71b32a4a73c7ae93ac71e66b1e685e05015c8c26b9\"" Apr 12 18:44:01.289482 systemd[1]: Started cri-containerd-fd7daddf6f8efaaa71e21d71b32a4a73c7ae93ac71e66b1e685e05015c8c26b9.scope. Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.380141 kernel: kauditd_printk_skb: 300 callbacks suppressed Apr 12 18:44:01.380286 kernel: audit: type=1400 audit(1712947441.377:645): avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f607960f7a8 items=0 ppid=1569 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:01.388379 kernel: audit: type=1300 audit(1712947441.377:645): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f607960f7a8 items=0 ppid=1569 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:01.388416 kernel: audit: type=1327 audit(1712947441.377:645): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664376461646466366638656661616137316532316437316233326134 Apr 12 18:44:01.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664376461646466366638656661616137316532316437316233326134 Apr 12 18:44:01.392754 kernel: audit: type=1400 audit(1712947441.377:646): avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.399000 kernel: audit: type=1400 audit(1712947441.377:646): avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.399065 kernel: audit: type=1400 audit(1712947441.377:646): avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.402196 kernel: audit: type=1400 audit(1712947441.377:646): avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.405078 kernel: audit: type=1400 audit(1712947441.377:646): avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.407925 kernel: audit: type=1400 audit(1712947441.377:646): avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.413762 kernel: audit: type=1400 audit(1712947441.377:646): avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.377000 audit: BPF prog-id=75 op=LOAD Apr 12 18:44:01.377000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00020e6b8 items=0 ppid=1569 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:01.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664376461646466366638656661616137316532316437316233326134 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.387000 audit: BPF prog-id=76 op=LOAD Apr 12 18:44:01.387000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00020e708 items=0 ppid=1569 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:01.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664376461646466366638656661616137316532316437316233326134 Apr 12 18:44:01.394000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:44:01.394000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:01.394000 audit: BPF prog-id=77 op=LOAD Apr 12 18:44:01.394000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00020e798 items=0 ppid=1569 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:01.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664376461646466366638656661616137316532316437316233326134 Apr 12 18:44:01.429018 env[1120]: time="2024-04-12T18:44:01.428970924Z" level=info msg="StartContainer for \"fd7daddf6f8efaaa71e21d71b32a4a73c7ae93ac71e66b1e685e05015c8c26b9\" returns successfully" Apr 12 18:44:01.439802 systemd[1]: cri-containerd-fd7daddf6f8efaaa71e21d71b32a4a73c7ae93ac71e66b1e685e05015c8c26b9.scope: Deactivated successfully. Apr 12 18:44:01.443000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:44:01.461855 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fd7daddf6f8efaaa71e21d71b32a4a73c7ae93ac71e66b1e685e05015c8c26b9-rootfs.mount: Deactivated successfully. Apr 12 18:44:01.838142 kubelet[1423]: E0412 18:44:01.830557 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:01.842991 env[1120]: time="2024-04-12T18:44:01.842918368Z" level=info msg="shim disconnected" id=fd7daddf6f8efaaa71e21d71b32a4a73c7ae93ac71e66b1e685e05015c8c26b9 Apr 12 18:44:01.842991 env[1120]: time="2024-04-12T18:44:01.842979849Z" level=warning msg="cleaning up after shim disconnected" id=fd7daddf6f8efaaa71e21d71b32a4a73c7ae93ac71e66b1e685e05015c8c26b9 namespace=k8s.io Apr 12 18:44:01.842991 env[1120]: time="2024-04-12T18:44:01.842989615Z" level=info msg="cleaning up dead shim" Apr 12 18:44:01.853779 env[1120]: time="2024-04-12T18:44:01.853713128Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:44:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1898 runtime=io.containerd.runc.v2\n" Apr 12 18:44:01.971911 kubelet[1423]: E0412 18:44:01.971853 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:44:02.057288 kubelet[1423]: E0412 18:44:02.057254 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:02.058183 env[1120]: time="2024-04-12T18:44:02.058122021Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:44:02.068574 kubelet[1423]: I0412 18:44:02.068541 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-kwt97" podStartSLOduration=12.224121971 podCreationTimestamp="2024-04-12 18:43:47 +0000 UTC" firstStartedPulling="2024-04-12 18:43:49.492111203 +0000 UTC m=+4.064362629" lastFinishedPulling="2024-04-12 18:43:52.336488804 +0000 UTC m=+6.908740230" observedRunningTime="2024-04-12 18:43:53.068601139 +0000 UTC m=+7.640852565" watchObservedRunningTime="2024-04-12 18:44:02.068499572 +0000 UTC m=+16.640750998" Apr 12 18:44:02.831612 kubelet[1423]: E0412 18:44:02.831554 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:03.569024 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount949693241.mount: Deactivated successfully. Apr 12 18:44:03.832408 kubelet[1423]: E0412 18:44:03.832275 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:03.975422 kubelet[1423]: E0412 18:44:03.975355 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:44:04.833491 kubelet[1423]: E0412 18:44:04.833425 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:05.821555 kubelet[1423]: E0412 18:44:05.821480 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:05.833942 kubelet[1423]: E0412 18:44:05.833905 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:05.972601 kubelet[1423]: E0412 18:44:05.972532 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:44:06.834701 kubelet[1423]: E0412 18:44:06.834644 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:07.835486 kubelet[1423]: E0412 18:44:07.835411 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:07.971923 kubelet[1423]: E0412 18:44:07.971868 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:44:08.836630 kubelet[1423]: E0412 18:44:08.836560 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:09.256920 env[1120]: time="2024-04-12T18:44:09.256780395Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:09.259036 env[1120]: time="2024-04-12T18:44:09.258977715Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:09.260949 env[1120]: time="2024-04-12T18:44:09.260916516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:09.262718 env[1120]: time="2024-04-12T18:44:09.262679029Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:09.263570 env[1120]: time="2024-04-12T18:44:09.263532506Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:44:09.265811 env[1120]: time="2024-04-12T18:44:09.265763835Z" level=info msg="CreateContainer within sandbox \"93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:44:09.279715 env[1120]: time="2024-04-12T18:44:09.279661108Z" level=info msg="CreateContainer within sandbox \"93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f9ebffef2bf48a7873893e4977c8e060ad66b5a32870896f8454157dfd582d25\"" Apr 12 18:44:09.280142 env[1120]: time="2024-04-12T18:44:09.280107221Z" level=info msg="StartContainer for \"f9ebffef2bf48a7873893e4977c8e060ad66b5a32870896f8454157dfd582d25\"" Apr 12 18:44:09.304916 systemd[1]: Started cri-containerd-f9ebffef2bf48a7873893e4977c8e060ad66b5a32870896f8454157dfd582d25.scope. Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.335138 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:44:09.335205 kernel: audit: type=1400 audit(1712947449.333:652): avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6fd48e14d8 items=0 ppid=1569 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.342612 kernel: audit: type=1300 audit(1712947449.333:652): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6fd48e14d8 items=0 ppid=1569 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.342659 kernel: audit: type=1327 audit(1712947449.333:652): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639656266666566326266343861373837333839336534393737633865 Apr 12 18:44:09.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639656266666566326266343861373837333839336534393737633865 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.349562 kernel: audit: type=1400 audit(1712947449.333:653): avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.349607 kernel: audit: type=1400 audit(1712947449.333:653): avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.352456 kernel: audit: type=1400 audit(1712947449.333:653): avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.355375 kernel: audit: type=1400 audit(1712947449.333:653): avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.362598 kernel: audit: type=1400 audit(1712947449.333:653): avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.362735 kernel: audit: type=1400 audit(1712947449.333:653): avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.365934 kernel: audit: type=1400 audit(1712947449.333:653): avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.333000 audit: BPF prog-id=78 op=LOAD Apr 12 18:44:09.333000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a1f08 items=0 ppid=1569 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639656266666566326266343861373837333839336534393737633865 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.337000 audit: BPF prog-id=79 op=LOAD Apr 12 18:44:09.337000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a1f58 items=0 ppid=1569 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639656266666566326266343861373837333839336534393737633865 Apr 12 18:44:09.346000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:44:09.346000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.346000 audit: BPF prog-id=80 op=LOAD Apr 12 18:44:09.346000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a1fe8 items=0 ppid=1569 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639656266666566326266343861373837333839336534393737633865 Apr 12 18:44:09.371900 env[1120]: time="2024-04-12T18:44:09.371832034Z" level=info msg="StartContainer for \"f9ebffef2bf48a7873893e4977c8e060ad66b5a32870896f8454157dfd582d25\" returns successfully" Apr 12 18:44:09.837429 kubelet[1423]: E0412 18:44:09.837346 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:09.972967 kubelet[1423]: E0412 18:44:09.972590 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:44:10.070855 kubelet[1423]: E0412 18:44:10.070802 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:10.501601 systemd[1]: cri-containerd-f9ebffef2bf48a7873893e4977c8e060ad66b5a32870896f8454157dfd582d25.scope: Deactivated successfully. Apr 12 18:44:10.505000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:44:10.515499 kubelet[1423]: I0412 18:44:10.515275 1423 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:44:10.521789 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f9ebffef2bf48a7873893e4977c8e060ad66b5a32870896f8454157dfd582d25-rootfs.mount: Deactivated successfully. Apr 12 18:44:10.838596 kubelet[1423]: E0412 18:44:10.838387 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:11.072443 kubelet[1423]: E0412 18:44:11.072398 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:11.838886 kubelet[1423]: E0412 18:44:11.838824 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:11.977660 systemd[1]: Created slice kubepods-besteffort-pod38945391_b56f_4a64_a843_457433834294.slice. Apr 12 18:44:11.979340 env[1120]: time="2024-04-12T18:44:11.979286342Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x7bts,Uid:38945391-b56f-4a64-a843-457433834294,Namespace:calico-system,Attempt:0,}" Apr 12 18:44:12.826947 env[1120]: time="2024-04-12T18:44:12.826856251Z" level=info msg="shim disconnected" id=f9ebffef2bf48a7873893e4977c8e060ad66b5a32870896f8454157dfd582d25 Apr 12 18:44:12.826947 env[1120]: time="2024-04-12T18:44:12.826910613Z" level=warning msg="cleaning up after shim disconnected" id=f9ebffef2bf48a7873893e4977c8e060ad66b5a32870896f8454157dfd582d25 namespace=k8s.io Apr 12 18:44:12.826947 env[1120]: time="2024-04-12T18:44:12.826922439Z" level=info msg="cleaning up dead shim" Apr 12 18:44:12.885569 kubelet[1423]: E0412 18:44:12.885514 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:12.889791 env[1120]: time="2024-04-12T18:44:12.889734724Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:44:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1966 runtime=io.containerd.runc.v2\n" Apr 12 18:44:13.005635 env[1120]: time="2024-04-12T18:44:13.005552048Z" level=error msg="Failed to destroy network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:13.006055 env[1120]: time="2024-04-12T18:44:13.005933554Z" level=error msg="encountered an error cleaning up failed sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:13.006055 env[1120]: time="2024-04-12T18:44:13.005977751Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x7bts,Uid:38945391-b56f-4a64-a843-457433834294,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:13.006296 kubelet[1423]: E0412 18:44:13.006249 1423 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:13.006397 kubelet[1423]: E0412 18:44:13.006337 1423 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x7bts" Apr 12 18:44:13.006397 kubelet[1423]: E0412 18:44:13.006358 1423 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x7bts" Apr 12 18:44:13.006481 kubelet[1423]: E0412 18:44:13.006421 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-x7bts_calico-system(38945391-b56f-4a64-a843-457433834294)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-x7bts_calico-system(38945391-b56f-4a64-a843-457433834294)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:44:13.006993 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b-shm.mount: Deactivated successfully. Apr 12 18:44:13.075940 kubelet[1423]: I0412 18:44:13.075916 1423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:13.076819 env[1120]: time="2024-04-12T18:44:13.076775780Z" level=info msg="StopPodSandbox for \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\"" Apr 12 18:44:13.078065 kubelet[1423]: E0412 18:44:13.077964 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:13.078648 env[1120]: time="2024-04-12T18:44:13.078605134Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:44:13.101281 env[1120]: time="2024-04-12T18:44:13.101193205Z" level=error msg="StopPodSandbox for \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\" failed" error="failed to destroy network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:13.101590 kubelet[1423]: E0412 18:44:13.101559 1423 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:13.101657 kubelet[1423]: E0412 18:44:13.101644 1423 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b"} Apr 12 18:44:13.101694 kubelet[1423]: E0412 18:44:13.101683 1423 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"38945391-b56f-4a64-a843-457433834294\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:44:13.101784 kubelet[1423]: E0412 18:44:13.101715 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"38945391-b56f-4a64-a843-457433834294\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x7bts" podUID="38945391-b56f-4a64-a843-457433834294" Apr 12 18:44:13.790000 audit[2039]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:13.790000 audit[2039]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff16fc4630 a2=0 a3=7fff16fc461c items=0 ppid=1647 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:13.797000 audit[2039]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:13.797000 audit[2039]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff16fc4630 a2=0 a3=0 items=0 ppid=1647 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:13.886678 kubelet[1423]: E0412 18:44:13.886615 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:14.764502 kubelet[1423]: I0412 18:44:14.764437 1423 topology_manager.go:215] "Topology Admit Handler" podUID="c40a4791-fe20-4d08-b234-b81c340f85af" podNamespace="default" podName="nginx-deployment-6d5f899847-ftwd2" Apr 12 18:44:14.769119 systemd[1]: Created slice kubepods-besteffort-podc40a4791_fe20_4d08_b234_b81c340f85af.slice. Apr 12 18:44:14.827665 kubelet[1423]: I0412 18:44:14.827608 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vz5gn\" (UniqueName: \"kubernetes.io/projected/c40a4791-fe20-4d08-b234-b81c340f85af-kube-api-access-vz5gn\") pod \"nginx-deployment-6d5f899847-ftwd2\" (UID: \"c40a4791-fe20-4d08-b234-b81c340f85af\") " pod="default/nginx-deployment-6d5f899847-ftwd2" Apr 12 18:44:14.886888 kubelet[1423]: E0412 18:44:14.886822 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:14.978000 audit[2041]: NETFILTER_CFG table=filter:67 family=2 entries=11 op=nft_register_rule pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:14.979624 kernel: kauditd_printk_skb: 40 callbacks suppressed Apr 12 18:44:14.979681 kernel: audit: type=1325 audit(1712947454.978:661): table=filter:67 family=2 entries=11 op=nft_register_rule pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:14.978000 audit[2041]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc0d675ef0 a2=0 a3=7ffc0d675edc items=0 ppid=1647 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.022630 kernel: audit: type=1300 audit(1712947454.978:661): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc0d675ef0 a2=0 a3=7ffc0d675edc items=0 ppid=1647 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.052643 kernel: audit: type=1327 audit(1712947454.978:661): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.054000 audit[2041]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:15.054000 audit[2041]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc0d675ef0 a2=0 a3=7ffc0d675edc items=0 ppid=1647 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.072160 env[1120]: time="2024-04-12T18:44:15.072097803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ftwd2,Uid:c40a4791-fe20-4d08-b234-b81c340f85af,Namespace:default,Attempt:0,}" Apr 12 18:44:15.094780 kernel: audit: type=1325 audit(1712947455.054:662): table=nat:68 family=2 entries=35 op=nft_register_chain pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:15.094960 kernel: audit: type=1300 audit(1712947455.054:662): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc0d675ef0 a2=0 a3=7ffc0d675edc items=0 ppid=1647 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.094995 kernel: audit: type=1327 audit(1712947455.054:662): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.809000 audit[2058]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:15.809000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe7f778ac0 a2=0 a3=7ffe7f778aac items=0 ppid=1647 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.819783 kernel: audit: type=1325 audit(1712947455.809:663): table=filter:69 family=2 entries=8 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:15.819847 kernel: audit: type=1300 audit(1712947455.809:663): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe7f778ac0 a2=0 a3=7ffe7f778aac items=0 ppid=1647 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.809000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.823128 kernel: audit: type=1327 audit(1712947455.809:663): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.811000 audit[2058]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:15.829407 kernel: audit: type=1325 audit(1712947455.811:664): table=nat:70 family=2 entries=44 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:15.811000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe7f778ac0 a2=0 a3=7ffe7f778aac items=0 ppid=1647 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.865619 env[1120]: time="2024-04-12T18:44:15.865529815Z" level=error msg="Failed to destroy network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:15.865964 env[1120]: time="2024-04-12T18:44:15.865919683Z" level=error msg="encountered an error cleaning up failed sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:15.866002 env[1120]: time="2024-04-12T18:44:15.865980906Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ftwd2,Uid:c40a4791-fe20-4d08-b234-b81c340f85af,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:15.866292 kubelet[1423]: E0412 18:44:15.866270 1423 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:15.866390 kubelet[1423]: E0412 18:44:15.866348 1423 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ftwd2" Apr 12 18:44:15.866390 kubelet[1423]: E0412 18:44:15.866370 1423 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ftwd2" Apr 12 18:44:15.866448 kubelet[1423]: E0412 18:44:15.866432 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-ftwd2_default(c40a4791-fe20-4d08-b234-b81c340f85af)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-ftwd2_default(c40a4791-fe20-4d08-b234-b81c340f85af)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ftwd2" podUID="c40a4791-fe20-4d08-b234-b81c340f85af" Apr 12 18:44:15.867063 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46-shm.mount: Deactivated successfully. Apr 12 18:44:15.887777 kubelet[1423]: E0412 18:44:15.887719 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:16.084113 kubelet[1423]: I0412 18:44:16.083993 1423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:16.084881 env[1120]: time="2024-04-12T18:44:16.084792988Z" level=info msg="StopPodSandbox for \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\"" Apr 12 18:44:16.126977 env[1120]: time="2024-04-12T18:44:16.126898372Z" level=error msg="StopPodSandbox for \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\" failed" error="failed to destroy network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:44:16.127193 kubelet[1423]: E0412 18:44:16.127157 1423 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:16.127193 kubelet[1423]: E0412 18:44:16.127205 1423 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46"} Apr 12 18:44:16.127475 kubelet[1423]: E0412 18:44:16.127239 1423 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c40a4791-fe20-4d08-b234-b81c340f85af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:44:16.127475 kubelet[1423]: E0412 18:44:16.127268 1423 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c40a4791-fe20-4d08-b234-b81c340f85af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ftwd2" podUID="c40a4791-fe20-4d08-b234-b81c340f85af" Apr 12 18:44:16.330000 audit[2109]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:16.330000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe4d417460 a2=0 a3=7ffe4d41744c items=0 ppid=1647 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:16.335000 audit[2109]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:16.335000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe4d417460 a2=0 a3=7ffe4d41744c items=0 ppid=1647 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:16.888889 kubelet[1423]: E0412 18:44:16.888800 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:17.889631 kubelet[1423]: E0412 18:44:17.889558 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:18.890389 kubelet[1423]: E0412 18:44:18.890298 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:19.891084 kubelet[1423]: E0412 18:44:19.890992 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:20.892022 kubelet[1423]: E0412 18:44:20.891945 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:21.450152 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1785770132.mount: Deactivated successfully. Apr 12 18:44:22.360886 kubelet[1423]: E0412 18:44:21.892889 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:22.621505 env[1120]: time="2024-04-12T18:44:22.621316592Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:22.623124 env[1120]: time="2024-04-12T18:44:22.623090977Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:22.624686 env[1120]: time="2024-04-12T18:44:22.624610517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:22.633081 env[1120]: time="2024-04-12T18:44:22.633038271Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:22.633673 env[1120]: time="2024-04-12T18:44:22.633628291Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:44:22.641141 env[1120]: time="2024-04-12T18:44:22.641086692Z" level=info msg="CreateContainer within sandbox \"93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:44:22.821280 env[1120]: time="2024-04-12T18:44:22.821203949Z" level=info msg="CreateContainer within sandbox \"93baaeecced2a5dea37b02d20f51fd7b7367679176df7a22dff2498f39044ded\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6990f1a977fb6da3ea032a18c418eb2dad7e00b1036ee2b51539dd540dc6f6e3\"" Apr 12 18:44:22.821813 env[1120]: time="2024-04-12T18:44:22.821777124Z" level=info msg="StartContainer for \"6990f1a977fb6da3ea032a18c418eb2dad7e00b1036ee2b51539dd540dc6f6e3\"" Apr 12 18:44:22.838233 systemd[1]: Started cri-containerd-6990f1a977fb6da3ea032a18c418eb2dad7e00b1036ee2b51539dd540dc6f6e3.scope. Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.857455 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 18:44:22.857532 kernel: audit: type=1400 audit(1712947462.856:667): avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f70ac4091a8 items=0 ppid=1569 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.865786 kernel: audit: type=1300 audit(1712947462.856:667): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f70ac4091a8 items=0 ppid=1569 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.865874 kernel: audit: type=1327 audit(1712947462.856:667): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639393066316139373766623664613365613033326131386334313865 Apr 12 18:44:22.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639393066316139373766623664613365613033326131386334313865 Apr 12 18:44:22.870176 kernel: audit: type=1400 audit(1712947462.856:668): avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.873175 kernel: audit: type=1400 audit(1712947462.856:668): avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.880015 kernel: audit: type=1400 audit(1712947462.856:668): avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.880177 kernel: audit: type=1400 audit(1712947462.856:668): avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.883207 kernel: audit: type=1400 audit(1712947462.856:668): avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.890174 kernel: audit: type=1400 audit(1712947462.856:668): avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.890247 kernel: audit: type=1400 audit(1712947462.856:668): avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.856000 audit: BPF prog-id=81 op=LOAD Apr 12 18:44:22.856000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000298c08 items=0 ppid=1569 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639393066316139373766623664613365613033326131386334313865 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.860000 audit: BPF prog-id=82 op=LOAD Apr 12 18:44:22.860000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000298c58 items=0 ppid=1569 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639393066316139373766623664613365613033326131386334313865 Apr 12 18:44:22.870000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:44:22.870000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:22.870000 audit: BPF prog-id=83 op=LOAD Apr 12 18:44:22.870000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000298ce8 items=0 ppid=1569 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639393066316139373766623664613365613033326131386334313865 Apr 12 18:44:22.894463 kubelet[1423]: E0412 18:44:22.893416 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:22.898732 env[1120]: time="2024-04-12T18:44:22.898687008Z" level=info msg="StartContainer for \"6990f1a977fb6da3ea032a18c418eb2dad7e00b1036ee2b51539dd540dc6f6e3\" returns successfully" Apr 12 18:44:22.975550 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:44:22.975696 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:44:23.098862 kubelet[1423]: E0412 18:44:23.098821 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:23.894154 kubelet[1423]: E0412 18:44:23.894065 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:24.100467 kubelet[1423]: E0412 18:44:24.100430 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:24.206000 audit[2302]: AVC avc: denied { write } for pid=2302 comm="tee" name="fd" dev="proc" ino=20856 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:24.206000 audit[2299]: AVC avc: denied { write } for pid=2299 comm="tee" name="fd" dev="proc" ino=19138 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:24.206000 audit[2302]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd73400980 a2=241 a3=1b6 items=1 ppid=2243 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.206000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:44:24.206000 audit: PATH item=0 name="/dev/fd/63" inode=20853 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:24.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:24.206000 audit[2299]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8ceab990 a2=241 a3=1b6 items=1 ppid=2237 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.206000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:44:24.206000 audit: PATH item=0 name="/dev/fd/63" inode=20852 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:24.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:24.209000 audit[2297]: AVC avc: denied { write } for pid=2297 comm="tee" name="fd" dev="proc" ino=19872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:24.209000 audit[2297]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6bbba98f a2=241 a3=1b6 items=1 ppid=2239 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.209000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:44:24.209000 audit: PATH item=0 name="/dev/fd/63" inode=19864 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:24.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:24.228000 audit[2284]: AVC avc: denied { write } for pid=2284 comm="tee" name="fd" dev="proc" ino=19142 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:24.232000 audit[2308]: AVC avc: denied { write } for pid=2308 comm="tee" name="fd" dev="proc" ino=19148 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:24.232000 audit[2308]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffe48897f a2=241 a3=1b6 items=1 ppid=2238 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.232000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:44:24.232000 audit: PATH item=0 name="/dev/fd/63" inode=19135 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:24.232000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:24.228000 audit[2284]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7069e98f a2=241 a3=1b6 items=1 ppid=2248 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.228000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:44:24.228000 audit: PATH item=0 name="/dev/fd/63" inode=19132 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:24.228000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:24.235000 audit[2315]: AVC avc: denied { write } for pid=2315 comm="tee" name="fd" dev="proc" ino=21585 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:24.235000 audit[2315]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8b37f98f a2=241 a3=1b6 items=1 ppid=2251 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.235000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:44:24.235000 audit: PATH item=0 name="/dev/fd/63" inode=19145 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:24.235000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:24.239000 audit[2317]: AVC avc: denied { write } for pid=2317 comm="tee" name="fd" dev="proc" ino=19155 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:24.239000 audit[2317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc15625991 a2=241 a3=1b6 items=1 ppid=2246 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.239000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:44:24.239000 audit: PATH item=0 name="/dev/fd/63" inode=19877 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:24.239000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:24.323551 kernel: Initializing XFRM netlink socket Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit: BPF prog-id=84 op=LOAD Apr 12 18:44:24.402000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc8358350 a2=70 a3=7fb55ef59000 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.402000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit: BPF prog-id=85 op=LOAD Apr 12 18:44:24.402000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc8358350 a2=70 a3=6f items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.402000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffc8358300 a2=70 a3=7fffc8358350 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.402000 audit: BPF prog-id=86 op=LOAD Apr 12 18:44:24.402000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffc83582e0 a2=70 a3=7fffc8358350 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.403000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:44:24.403000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.403000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc83583c0 a2=70 a3=0 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.403000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.403000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc83583b0 a2=70 a3=0 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.403000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.403000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc8358320 a2=70 a3=0 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.403000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.403000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffc83583f0 a2=70 a3=7e2e10 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.403000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.403000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffc83583f0 a2=70 a3=7df880 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.404000 audit: BPF prog-id=87 op=LOAD Apr 12 18:44:24.404000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffc8358310 a2=70 a3=0 items=0 ppid=2241 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:24.408000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.408000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeca392040 a2=70 a3=208 items=0 ppid=2241 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.408000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:44:24.408000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.408000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeca391f10 a2=70 a3=3 items=0 ppid=2241 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.408000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:44:24.415000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:44:24.454000 audit[2416]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:24.454000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdbe518fc0 a2=0 a3=7ffdbe518fac items=0 ppid=2241 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.454000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:24.460000 audit[2415]: NETFILTER_CFG table=raw:74 family=2 entries=19 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:24.461000 audit[2417]: NETFILTER_CFG table=nat:75 family=2 entries=15 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:24.461000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffddf4a2600 a2=0 a3=7ffddf4a25ec items=0 ppid=2241 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.461000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:24.460000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffd027593c0 a2=0 a3=7ffd027593ac items=0 ppid=2241 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.460000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:24.463000 audit[2419]: NETFILTER_CFG table=filter:76 family=2 entries=39 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:24.463000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff192344b0 a2=0 a3=7fff1923449c items=0 ppid=2241 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.463000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:24.895191 kubelet[1423]: E0412 18:44:24.895133 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:25.337485 systemd-networkd[1026]: vxlan.calico: Link UP Apr 12 18:44:25.337494 systemd-networkd[1026]: vxlan.calico: Gained carrier Apr 12 18:44:25.821511 kubelet[1423]: E0412 18:44:25.821433 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:25.896000 kubelet[1423]: E0412 18:44:25.895924 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:25.989903 update_engine[1111]: I0412 18:44:25.989813 1111 update_attempter.cc:509] Updating boot flags... Apr 12 18:44:26.586913 systemd-networkd[1026]: vxlan.calico: Gained IPv6LL Apr 12 18:44:26.896417 kubelet[1423]: E0412 18:44:26.896306 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:27.896801 kubelet[1423]: E0412 18:44:27.896729 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:27.973242 env[1120]: time="2024-04-12T18:44:27.973178904Z" level=info msg="StopPodSandbox for \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\"" Apr 12 18:44:28.013285 kubelet[1423]: I0412 18:44:28.013217 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-kh5bt" podStartSLOduration=7.884156381 podCreationTimestamp="2024-04-12 18:43:47 +0000 UTC" firstStartedPulling="2024-04-12 18:43:49.504926233 +0000 UTC m=+4.077177659" lastFinishedPulling="2024-04-12 18:44:22.633939483 +0000 UTC m=+37.206190909" observedRunningTime="2024-04-12 18:44:23.110225672 +0000 UTC m=+37.682477118" watchObservedRunningTime="2024-04-12 18:44:28.013169631 +0000 UTC m=+42.585421057" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.013 [INFO][2456] k8s.go 585: Cleaning up netns ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.013 [INFO][2456] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" iface="eth0" netns="/var/run/netns/cni-e9e7b3de-7bd1-ec98-e6cc-ed38b7f1af65" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.014 [INFO][2456] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" iface="eth0" netns="/var/run/netns/cni-e9e7b3de-7bd1-ec98-e6cc-ed38b7f1af65" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.014 [INFO][2456] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" iface="eth0" netns="/var/run/netns/cni-e9e7b3de-7bd1-ec98-e6cc-ed38b7f1af65" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.014 [INFO][2456] k8s.go 592: Releasing IP address(es) ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.014 [INFO][2456] utils.go 188: Calico CNI releasing IP address ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.033 [INFO][2463] ipam_plugin.go 415: Releasing address using handleID ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.033 [INFO][2463] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.033 [INFO][2463] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.040 [WARNING][2463] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.040 [INFO][2463] ipam_plugin.go 443: Releasing address using workloadID ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.042 [INFO][2463] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:28.045168 env[1120]: 2024-04-12 18:44:28.044 [INFO][2456] k8s.go 598: Teardown processing complete. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:28.045766 env[1120]: time="2024-04-12T18:44:28.045371769Z" level=info msg="TearDown network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\" successfully" Apr 12 18:44:28.045766 env[1120]: time="2024-04-12T18:44:28.045426269Z" level=info msg="StopPodSandbox for \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\" returns successfully" Apr 12 18:44:28.046860 systemd[1]: run-netns-cni\x2de9e7b3de\x2d7bd1\x2dec98\x2de6cc\x2ded38b7f1af65.mount: Deactivated successfully. Apr 12 18:44:28.047722 env[1120]: time="2024-04-12T18:44:28.047658554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x7bts,Uid:38945391-b56f-4a64-a843-457433834294,Namespace:calico-system,Attempt:1,}" Apr 12 18:44:28.152195 systemd-networkd[1026]: calid62d5f79854: Link UP Apr 12 18:44:28.155826 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:44:28.155913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid62d5f79854: link becomes ready Apr 12 18:44:28.156146 systemd-networkd[1026]: calid62d5f79854: Gained carrier Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.090 [INFO][2472] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.39-k8s-csi--node--driver--x7bts-eth0 csi-node-driver- calico-system 38945391-b56f-4a64-a843-457433834294 1004 0 2024-04-12 18:43:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.39 csi-node-driver-x7bts eth0 default [] [] [kns.calico-system ksa.calico-system.default] calid62d5f79854 [] []}} ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Namespace="calico-system" Pod="csi-node-driver-x7bts" WorkloadEndpoint="10.0.0.39-k8s-csi--node--driver--x7bts-" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.090 [INFO][2472] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Namespace="calico-system" Pod="csi-node-driver-x7bts" WorkloadEndpoint="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.114 [INFO][2485] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" HandleID="k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.123 [INFO][2485] ipam_plugin.go 268: Auto assigning IP ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" HandleID="k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ec0c0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.39", "pod":"csi-node-driver-x7bts", "timestamp":"2024-04-12 18:44:28.114883957 +0000 UTC"}, Hostname:"10.0.0.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.123 [INFO][2485] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.123 [INFO][2485] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.123 [INFO][2485] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.39' Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.125 [INFO][2485] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.129 [INFO][2485] ipam.go 372: Looking up existing affinities for host host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.133 [INFO][2485] ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.134 [INFO][2485] ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.136 [INFO][2485] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.136 [INFO][2485] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.138 [INFO][2485] ipam.go 1682: Creating new handle: k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9 Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.141 [INFO][2485] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.145 [INFO][2485] ipam.go 1216: Successfully claimed IPs: [192.168.23.193/26] block=192.168.23.192/26 handle="k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.146 [INFO][2485] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.193/26] handle="k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" host="10.0.0.39" Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.146 [INFO][2485] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:28.168304 env[1120]: 2024-04-12 18:44:28.146 [INFO][2485] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.23.193/26] IPv6=[] ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" HandleID="k8s-pod-network.85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.169139 env[1120]: 2024-04-12 18:44:28.149 [INFO][2472] k8s.go 385: Populated endpoint ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Namespace="calico-system" Pod="csi-node-driver-x7bts" WorkloadEndpoint="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-csi--node--driver--x7bts-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"38945391-b56f-4a64-a843-457433834294", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"", Pod:"csi-node-driver-x7bts", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid62d5f79854", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:28.169139 env[1120]: 2024-04-12 18:44:28.149 [INFO][2472] k8s.go 386: Calico CNI using IPs: [192.168.23.193/32] ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Namespace="calico-system" Pod="csi-node-driver-x7bts" WorkloadEndpoint="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.169139 env[1120]: 2024-04-12 18:44:28.149 [INFO][2472] dataplane_linux.go 68: Setting the host side veth name to calid62d5f79854 ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Namespace="calico-system" Pod="csi-node-driver-x7bts" WorkloadEndpoint="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.169139 env[1120]: 2024-04-12 18:44:28.156 [INFO][2472] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Namespace="calico-system" Pod="csi-node-driver-x7bts" WorkloadEndpoint="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.169139 env[1120]: 2024-04-12 18:44:28.156 [INFO][2472] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Namespace="calico-system" Pod="csi-node-driver-x7bts" WorkloadEndpoint="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-csi--node--driver--x7bts-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"38945391-b56f-4a64-a843-457433834294", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9", Pod:"csi-node-driver-x7bts", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid62d5f79854", MAC:"d6:ed:ac:58:08:c7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:28.169139 env[1120]: 2024-04-12 18:44:28.164 [INFO][2472] k8s.go 498: Wrote updated endpoint to datastore ContainerID="85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9" Namespace="calico-system" Pod="csi-node-driver-x7bts" WorkloadEndpoint="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:28.180360 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 18:44:28.180530 kernel: audit: type=1325 audit(1712947468.177:700): table=filter:77 family=2 entries=36 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:28.177000 audit[2510]: NETFILTER_CFG table=filter:77 family=2 entries=36 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:28.177000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffd96be4740 a2=0 a3=7ffd96be472c items=0 ppid=2241 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:28.182093 env[1120]: time="2024-04-12T18:44:28.181740350Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:28.182093 env[1120]: time="2024-04-12T18:44:28.181789138Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:28.182093 env[1120]: time="2024-04-12T18:44:28.181806713Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:28.182093 env[1120]: time="2024-04-12T18:44:28.181970271Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9 pid=2517 runtime=io.containerd.runc.v2 Apr 12 18:44:28.186359 kernel: audit: type=1300 audit(1712947468.177:700): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffd96be4740 a2=0 a3=7ffd96be472c items=0 ppid=2241 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:28.186409 kernel: audit: type=1327 audit(1712947468.177:700): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:28.177000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:28.202244 systemd[1]: Started cri-containerd-85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9.scope. Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.222070 kernel: audit: type=1400 audit(1712947468.209:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.222159 kernel: audit: type=1400 audit(1712947468.209:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.222183 kernel: audit: type=1400 audit(1712947468.209:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.222202 kernel: audit: type=1400 audit(1712947468.209:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.225587 kernel: audit: type=1400 audit(1712947468.209:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.225757 kernel: audit: type=1400 audit(1712947468.209:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.228458 kernel: audit: type=1400 audit(1712947468.209:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.212000 audit: BPF prog-id=88 op=LOAD Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2517 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:28.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663731653130343530386337643230323833653261313230313364 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2517 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:28.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663731653130343530386337643230323833653261313230313364 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.213000 audit: BPF prog-id=89 op=LOAD Apr 12 18:44:28.213000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286f50 items=0 ppid=2517 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:28.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663731653130343530386337643230323833653261313230313364 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.218000 audit: BPF prog-id=90 op=LOAD Apr 12 18:44:28.218000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000286f98 items=0 ppid=2517 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:28.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663731653130343530386337643230323833653261313230313364 Apr 12 18:44:28.221000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:44:28.221000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:28.221000 audit: BPF prog-id=91 op=LOAD Apr 12 18:44:28.221000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002873a8 items=0 ppid=2517 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:28.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663731653130343530386337643230323833653261313230313364 Apr 12 18:44:28.231552 systemd-resolved[1068]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:28.243396 env[1120]: time="2024-04-12T18:44:28.243343620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x7bts,Uid:38945391-b56f-4a64-a843-457433834294,Namespace:calico-system,Attempt:1,} returns sandbox id \"85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9\"" Apr 12 18:44:28.245104 env[1120]: time="2024-04-12T18:44:28.245046675Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:44:28.897945 kubelet[1423]: E0412 18:44:28.897876 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:28.972752 env[1120]: time="2024-04-12T18:44:28.972688367Z" level=info msg="StopPodSandbox for \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\"" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.009 [INFO][2566] k8s.go 585: Cleaning up netns ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.010 [INFO][2566] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" iface="eth0" netns="/var/run/netns/cni-453773f9-c605-f8fa-9e23-99f77de7eefd" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.010 [INFO][2566] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" iface="eth0" netns="/var/run/netns/cni-453773f9-c605-f8fa-9e23-99f77de7eefd" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.010 [INFO][2566] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" iface="eth0" netns="/var/run/netns/cni-453773f9-c605-f8fa-9e23-99f77de7eefd" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.010 [INFO][2566] k8s.go 592: Releasing IP address(es) ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.010 [INFO][2566] utils.go 188: Calico CNI releasing IP address ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.028 [INFO][2574] ipam_plugin.go 415: Releasing address using handleID ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.028 [INFO][2574] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.028 [INFO][2574] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.035 [WARNING][2574] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.035 [INFO][2574] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.037 [INFO][2574] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:29.039441 env[1120]: 2024-04-12 18:44:29.038 [INFO][2566] k8s.go 598: Teardown processing complete. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:29.040117 env[1120]: time="2024-04-12T18:44:29.039619271Z" level=info msg="TearDown network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\" successfully" Apr 12 18:44:29.040117 env[1120]: time="2024-04-12T18:44:29.039667979Z" level=info msg="StopPodSandbox for \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\" returns successfully" Apr 12 18:44:29.040518 env[1120]: time="2024-04-12T18:44:29.040483136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ftwd2,Uid:c40a4791-fe20-4d08-b234-b81c340f85af,Namespace:default,Attempt:1,}" Apr 12 18:44:29.046741 systemd[1]: run-containerd-runc-k8s.io-85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9-runc.85TtCs.mount: Deactivated successfully. Apr 12 18:44:29.046854 systemd[1]: run-netns-cni\x2d453773f9\x2dc605\x2df8fa\x2d9e23\x2d99f77de7eefd.mount: Deactivated successfully. Apr 12 18:44:29.139239 systemd-networkd[1026]: cali0a5575cf3ad: Link UP Apr 12 18:44:29.140859 systemd-networkd[1026]: cali0a5575cf3ad: Gained carrier Apr 12 18:44:29.141420 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0a5575cf3ad: link becomes ready Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.081 [INFO][2581] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0 nginx-deployment-6d5f899847- default c40a4791-fe20-4d08-b234-b81c340f85af 1012 0 2024-04-12 18:44:14 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.39 nginx-deployment-6d5f899847-ftwd2 eth0 default [] [] [kns.default ksa.default.default] cali0a5575cf3ad [] []}} ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Namespace="default" Pod="nginx-deployment-6d5f899847-ftwd2" WorkloadEndpoint="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.081 [INFO][2581] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Namespace="default" Pod="nginx-deployment-6d5f899847-ftwd2" WorkloadEndpoint="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.101 [INFO][2594] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" HandleID="k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.112 [INFO][2594] ipam_plugin.go 268: Auto assigning IP ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" HandleID="k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000261eb0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.39", "pod":"nginx-deployment-6d5f899847-ftwd2", "timestamp":"2024-04-12 18:44:29.101620388 +0000 UTC"}, Hostname:"10.0.0.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.112 [INFO][2594] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.113 [INFO][2594] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.113 [INFO][2594] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.39' Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.115 [INFO][2594] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.119 [INFO][2594] ipam.go 372: Looking up existing affinities for host host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.122 [INFO][2594] ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.124 [INFO][2594] ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.126 [INFO][2594] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.126 [INFO][2594] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.127 [INFO][2594] ipam.go 1682: Creating new handle: k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7 Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.130 [INFO][2594] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.134 [INFO][2594] ipam.go 1216: Successfully claimed IPs: [192.168.23.194/26] block=192.168.23.192/26 handle="k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.134 [INFO][2594] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.194/26] handle="k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" host="10.0.0.39" Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.134 [INFO][2594] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:29.149382 env[1120]: 2024-04-12 18:44:29.134 [INFO][2594] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.23.194/26] IPv6=[] ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" HandleID="k8s-pod-network.0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.149983 env[1120]: 2024-04-12 18:44:29.135 [INFO][2581] k8s.go 385: Populated endpoint ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Namespace="default" Pod="nginx-deployment-6d5f899847-ftwd2" WorkloadEndpoint="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c40a4791-fe20-4d08-b234-b81c340f85af", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"", Pod:"nginx-deployment-6d5f899847-ftwd2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0a5575cf3ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:29.149983 env[1120]: 2024-04-12 18:44:29.137 [INFO][2581] k8s.go 386: Calico CNI using IPs: [192.168.23.194/32] ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Namespace="default" Pod="nginx-deployment-6d5f899847-ftwd2" WorkloadEndpoint="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.149983 env[1120]: 2024-04-12 18:44:29.137 [INFO][2581] dataplane_linux.go 68: Setting the host side veth name to cali0a5575cf3ad ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Namespace="default" Pod="nginx-deployment-6d5f899847-ftwd2" WorkloadEndpoint="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.149983 env[1120]: 2024-04-12 18:44:29.141 [INFO][2581] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Namespace="default" Pod="nginx-deployment-6d5f899847-ftwd2" WorkloadEndpoint="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.149983 env[1120]: 2024-04-12 18:44:29.142 [INFO][2581] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Namespace="default" Pod="nginx-deployment-6d5f899847-ftwd2" WorkloadEndpoint="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c40a4791-fe20-4d08-b234-b81c340f85af", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7", Pod:"nginx-deployment-6d5f899847-ftwd2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0a5575cf3ad", MAC:"02:c2:12:0c:fc:4f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:29.149983 env[1120]: 2024-04-12 18:44:29.148 [INFO][2581] k8s.go 498: Wrote updated endpoint to datastore ContainerID="0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7" Namespace="default" Pod="nginx-deployment-6d5f899847-ftwd2" WorkloadEndpoint="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:29.164131 env[1120]: time="2024-04-12T18:44:29.164047805Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:29.164351 env[1120]: time="2024-04-12T18:44:29.164308797Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:29.164469 env[1120]: time="2024-04-12T18:44:29.164443045Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:29.166000 audit[2637]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:29.166000 audit[2637]: SYSCALL arch=c000003e syscall=46 success=yes exit=21560 a0=3 a1=7ffe8608c920 a2=0 a3=7ffe8608c90c items=0 ppid=2241 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:29.166000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:29.167235 env[1120]: time="2024-04-12T18:44:29.167201964Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7 pid=2626 runtime=io.containerd.runc.v2 Apr 12 18:44:29.179807 systemd[1]: Started cri-containerd-0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7.scope. Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit: BPF prog-id=92 op=LOAD Apr 12 18:44:29.188000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2626 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:29.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396666613535326333643238663639613833656536306233636136 Apr 12 18:44:29.188000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.188000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2626 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:29.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396666613535326333643238663639613833656536306233636136 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit: BPF prog-id=93 op=LOAD Apr 12 18:44:29.189000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003460e0 items=0 ppid=2626 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:29.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396666613535326333643238663639613833656536306233636136 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit: BPF prog-id=94 op=LOAD Apr 12 18:44:29.189000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000346128 items=0 ppid=2626 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:29.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396666613535326333643238663639613833656536306233636136 Apr 12 18:44:29.189000 audit: BPF prog-id=94 op=UNLOAD Apr 12 18:44:29.189000 audit: BPF prog-id=93 op=UNLOAD Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:29.189000 audit: BPF prog-id=95 op=LOAD Apr 12 18:44:29.189000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000346538 items=0 ppid=2626 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:29.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396666613535326333643238663639613833656536306233636136 Apr 12 18:44:29.191099 systemd-resolved[1068]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:29.210713 env[1120]: time="2024-04-12T18:44:29.210653877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ftwd2,Uid:c40a4791-fe20-4d08-b234-b81c340f85af,Namespace:default,Attempt:1,} returns sandbox id \"0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7\"" Apr 12 18:44:29.274453 systemd-networkd[1026]: calid62d5f79854: Gained IPv6LL Apr 12 18:44:29.898560 kubelet[1423]: E0412 18:44:29.898502 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:30.362578 systemd-networkd[1026]: cali0a5575cf3ad: Gained IPv6LL Apr 12 18:44:30.823828 env[1120]: time="2024-04-12T18:44:30.823755757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:30.826572 env[1120]: time="2024-04-12T18:44:30.826539125Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:30.828230 env[1120]: time="2024-04-12T18:44:30.828158476Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:30.830023 env[1120]: time="2024-04-12T18:44:30.829964379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:30.830497 env[1120]: time="2024-04-12T18:44:30.830455836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:44:30.831184 env[1120]: time="2024-04-12T18:44:30.831157042Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:44:30.832207 env[1120]: time="2024-04-12T18:44:30.832171891Z" level=info msg="CreateContainer within sandbox \"85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:44:30.867874 env[1120]: time="2024-04-12T18:44:30.867803407Z" level=info msg="CreateContainer within sandbox \"85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"143bbad107d6d514316031e6520721cfcdac341bde3bb4860b9e4e61002876fc\"" Apr 12 18:44:30.868431 env[1120]: time="2024-04-12T18:44:30.868400595Z" level=info msg="StartContainer for \"143bbad107d6d514316031e6520721cfcdac341bde3bb4860b9e4e61002876fc\"" Apr 12 18:44:30.889642 systemd[1]: Started cri-containerd-143bbad107d6d514316031e6520721cfcdac341bde3bb4860b9e4e61002876fc.scope. Apr 12 18:44:30.899555 kubelet[1423]: E0412 18:44:30.899516 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdf5e200298 items=0 ppid=2517 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:30.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336262616431303764366435313433313630333165363532303732 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit: BPF prog-id=96 op=LOAD Apr 12 18:44:30.915000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e7f28 items=0 ppid=2517 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:30.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336262616431303764366435313433313630333165363532303732 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit: BPF prog-id=97 op=LOAD Apr 12 18:44:30.915000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e7f78 items=0 ppid=2517 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:30.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336262616431303764366435313433313630333165363532303732 Apr 12 18:44:30.915000 audit: BPF prog-id=97 op=UNLOAD Apr 12 18:44:30.915000 audit: BPF prog-id=96 op=UNLOAD Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:30.915000 audit: BPF prog-id=98 op=LOAD Apr 12 18:44:30.915000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b8008 items=0 ppid=2517 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:30.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336262616431303764366435313433313630333165363532303732 Apr 12 18:44:30.957942 env[1120]: time="2024-04-12T18:44:30.957875037Z" level=info msg="StartContainer for \"143bbad107d6d514316031e6520721cfcdac341bde3bb4860b9e4e61002876fc\" returns successfully" Apr 12 18:44:31.900235 kubelet[1423]: E0412 18:44:31.900189 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:32.901276 kubelet[1423]: E0412 18:44:32.901211 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:33.902093 kubelet[1423]: E0412 18:44:33.902033 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:34.220832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2688566076.mount: Deactivated successfully. Apr 12 18:44:34.902699 kubelet[1423]: E0412 18:44:34.902648 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:35.284849 env[1120]: time="2024-04-12T18:44:35.284691113Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:35.286669 env[1120]: time="2024-04-12T18:44:35.286616602Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:35.288575 env[1120]: time="2024-04-12T18:44:35.288529158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:35.290261 env[1120]: time="2024-04-12T18:44:35.290226992Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:35.290896 env[1120]: time="2024-04-12T18:44:35.290856835Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 18:44:35.291863 env[1120]: time="2024-04-12T18:44:35.291819150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:44:35.292752 env[1120]: time="2024-04-12T18:44:35.292722448Z" level=info msg="CreateContainer within sandbox \"0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 18:44:35.305664 env[1120]: time="2024-04-12T18:44:35.305612528Z" level=info msg="CreateContainer within sandbox \"0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"b565cc63e208e0d29de4d50d7c13a9879b36367ecdafc213f57440f8576b937a\"" Apr 12 18:44:35.306122 env[1120]: time="2024-04-12T18:44:35.306087398Z" level=info msg="StartContainer for \"b565cc63e208e0d29de4d50d7c13a9879b36367ecdafc213f57440f8576b937a\"" Apr 12 18:44:35.322036 systemd[1]: run-containerd-runc-k8s.io-b565cc63e208e0d29de4d50d7c13a9879b36367ecdafc213f57440f8576b937a-runc.4o1TzE.mount: Deactivated successfully. Apr 12 18:44:35.325697 systemd[1]: Started cri-containerd-b565cc63e208e0d29de4d50d7c13a9879b36367ecdafc213f57440f8576b937a.scope. Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.336100 kernel: kauditd_printk_skb: 153 callbacks suppressed Apr 12 18:44:35.336167 kernel: audit: type=1400 audit(1712947475.333:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.342624 kernel: audit: type=1400 audit(1712947475.333:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.345910 kernel: audit: type=1400 audit(1712947475.333:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.345966 kernel: audit: type=1400 audit(1712947475.333:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.352344 kernel: audit: type=1400 audit(1712947475.333:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.352389 kernel: audit: type=1400 audit(1712947475.333:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.358792 kernel: audit: type=1400 audit(1712947475.333:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.358825 kernel: audit: type=1400 audit(1712947475.333:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.365345 kernel: audit: type=1400 audit(1712947475.333:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.365414 kernel: audit: type=1400 audit(1712947475.333:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.333000 audit: BPF prog-id=99 op=LOAD Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2626 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:35.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363563633633653230386530643239646534643530643763313361 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2626 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:35.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363563633633653230386530643239646534643530643763313361 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.335000 audit: BPF prog-id=100 op=LOAD Apr 12 18:44:35.335000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025fdc0 items=0 ppid=2626 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:35.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363563633633653230386530643239646534643530643763313361 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.338000 audit: BPF prog-id=101 op=LOAD Apr 12 18:44:35.338000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025fe08 items=0 ppid=2626 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:35.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363563633633653230386530643239646534643530643763313361 Apr 12 18:44:35.344000 audit: BPF prog-id=101 op=UNLOAD Apr 12 18:44:35.344000 audit: BPF prog-id=100 op=UNLOAD Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:35.344000 audit: BPF prog-id=102 op=LOAD Apr 12 18:44:35.344000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c0218 items=0 ppid=2626 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:35.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363563633633653230386530643239646534643530643763313361 Apr 12 18:44:35.374496 env[1120]: time="2024-04-12T18:44:35.374453803Z" level=info msg="StartContainer for \"b565cc63e208e0d29de4d50d7c13a9879b36367ecdafc213f57440f8576b937a\" returns successfully" Apr 12 18:44:35.903099 kubelet[1423]: E0412 18:44:35.903002 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:36.138190 kubelet[1423]: I0412 18:44:36.138143 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-ftwd2" podStartSLOduration=16.058998571 podCreationTimestamp="2024-04-12 18:44:14 +0000 UTC" firstStartedPulling="2024-04-12 18:44:29.212129494 +0000 UTC m=+43.784380920" lastFinishedPulling="2024-04-12 18:44:35.291233603 +0000 UTC m=+49.863485029" observedRunningTime="2024-04-12 18:44:36.137877221 +0000 UTC m=+50.710128647" watchObservedRunningTime="2024-04-12 18:44:36.13810268 +0000 UTC m=+50.710354107" Apr 12 18:44:36.903503 kubelet[1423]: E0412 18:44:36.903434 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:36.975083 env[1120]: time="2024-04-12T18:44:36.975015380Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:36.977011 env[1120]: time="2024-04-12T18:44:36.976947233Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:36.978963 env[1120]: time="2024-04-12T18:44:36.978918783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:36.980579 env[1120]: time="2024-04-12T18:44:36.980547143Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:36.980941 env[1120]: time="2024-04-12T18:44:36.980908469Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:44:36.982535 env[1120]: time="2024-04-12T18:44:36.982495378Z" level=info msg="CreateContainer within sandbox \"85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:44:36.996751 env[1120]: time="2024-04-12T18:44:36.996685420Z" level=info msg="CreateContainer within sandbox \"85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2f3263d942da0dbd7ffb701bf6e6fdd49cd4edfdcc2e3853cd207c03cb4aaec6\"" Apr 12 18:44:36.997277 env[1120]: time="2024-04-12T18:44:36.997242538Z" level=info msg="StartContainer for \"2f3263d942da0dbd7ffb701bf6e6fdd49cd4edfdcc2e3853cd207c03cb4aaec6\"" Apr 12 18:44:37.016404 systemd[1]: run-containerd-runc-k8s.io-2f3263d942da0dbd7ffb701bf6e6fdd49cd4edfdcc2e3853cd207c03cb4aaec6-runc.9f4pGq.mount: Deactivated successfully. Apr 12 18:44:37.018151 systemd[1]: Started cri-containerd-2f3263d942da0dbd7ffb701bf6e6fdd49cd4edfdcc2e3853cd207c03cb4aaec6.scope. Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0002176b0 a2=3c a3=7f162138b0a8 items=0 ppid=2517 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:37.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333236336439343264613064626437666662373031626636653666 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.030000 audit: BPF prog-id=103 op=LOAD Apr 12 18:44:37.030000 audit[2782]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0002179d8 a2=78 a3=c0001d9ba8 items=0 ppid=2517 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:37.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333236336439343264613064626437666662373031626636653666 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit: BPF prog-id=104 op=LOAD Apr 12 18:44:37.031000 audit[2782]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000217770 a2=78 a3=c0001d9bf8 items=0 ppid=2517 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:37.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333236336439343264613064626437666662373031626636653666 Apr 12 18:44:37.031000 audit: BPF prog-id=104 op=UNLOAD Apr 12 18:44:37.031000 audit: BPF prog-id=103 op=UNLOAD Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { perfmon } for pid=2782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit[2782]: AVC avc: denied { bpf } for pid=2782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:37.031000 audit: BPF prog-id=105 op=LOAD Apr 12 18:44:37.031000 audit[2782]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000217c30 a2=78 a3=c0001d9c88 items=0 ppid=2517 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:37.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333236336439343264613064626437666662373031626636653666 Apr 12 18:44:37.047542 env[1120]: time="2024-04-12T18:44:37.047488532Z" level=info msg="StartContainer for \"2f3263d942da0dbd7ffb701bf6e6fdd49cd4edfdcc2e3853cd207c03cb4aaec6\" returns successfully" Apr 12 18:44:37.143272 kubelet[1423]: I0412 18:44:37.143229 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-x7bts" podStartSLOduration=41.406449062 podCreationTimestamp="2024-04-12 18:43:47 +0000 UTC" firstStartedPulling="2024-04-12 18:44:28.244410108 +0000 UTC m=+42.816661534" lastFinishedPulling="2024-04-12 18:44:36.981142796 +0000 UTC m=+51.553394223" observedRunningTime="2024-04-12 18:44:37.143064392 +0000 UTC m=+51.715315818" watchObservedRunningTime="2024-04-12 18:44:37.143181751 +0000 UTC m=+51.715433177" Apr 12 18:44:37.749460 kubelet[1423]: I0412 18:44:37.749421 1423 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:44:37.749460 kubelet[1423]: I0412 18:44:37.749466 1423 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:44:37.904379 kubelet[1423]: E0412 18:44:37.904308 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:38.905347 kubelet[1423]: E0412 18:44:38.905283 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:39.906024 kubelet[1423]: E0412 18:44:39.905968 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:40.279213 systemd[1]: run-containerd-runc-k8s.io-6990f1a977fb6da3ea032a18c418eb2dad7e00b1036ee2b51539dd540dc6f6e3-runc.DciKY9.mount: Deactivated successfully. Apr 12 18:44:40.328576 kubelet[1423]: E0412 18:44:40.328550 1423 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:40.906811 kubelet[1423]: E0412 18:44:40.906746 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:41.907553 kubelet[1423]: E0412 18:44:41.907494 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:42.459452 kubelet[1423]: I0412 18:44:42.459396 1423 topology_manager.go:215] "Topology Admit Handler" podUID="d40feebe-3f8e-4d27-8f51-40f3295ecd64" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 18:44:42.464696 systemd[1]: Created slice kubepods-besteffort-podd40feebe_3f8e_4d27_8f51_40f3295ecd64.slice. Apr 12 18:44:42.617018 kubelet[1423]: I0412 18:44:42.616951 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qth9d\" (UniqueName: \"kubernetes.io/projected/d40feebe-3f8e-4d27-8f51-40f3295ecd64-kube-api-access-qth9d\") pod \"nfs-server-provisioner-0\" (UID: \"d40feebe-3f8e-4d27-8f51-40f3295ecd64\") " pod="default/nfs-server-provisioner-0" Apr 12 18:44:42.617018 kubelet[1423]: I0412 18:44:42.617014 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/d40feebe-3f8e-4d27-8f51-40f3295ecd64-data\") pod \"nfs-server-provisioner-0\" (UID: \"d40feebe-3f8e-4d27-8f51-40f3295ecd64\") " pod="default/nfs-server-provisioner-0" Apr 12 18:44:42.667000 audit[2838]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.669600 kernel: kauditd_printk_skb: 90 callbacks suppressed Apr 12 18:44:42.669689 kernel: audit: type=1325 audit(1712947482.667:768): table=filter:79 family=2 entries=20 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.667000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcaa352960 a2=0 a3=7ffcaa35294c items=0 ppid=1647 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.678311 kernel: audit: type=1300 audit(1712947482.667:768): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcaa352960 a2=0 a3=7ffcaa35294c items=0 ppid=1647 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.678388 kernel: audit: type=1327 audit(1712947482.667:768): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.668000 audit[2838]: NETFILTER_CFG table=nat:80 family=2 entries=20 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.668000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcaa352960 a2=0 a3=0 items=0 ppid=1647 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.694311 kernel: audit: type=1325 audit(1712947482.668:769): table=nat:80 family=2 entries=20 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.694505 kernel: audit: type=1300 audit(1712947482.668:769): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcaa352960 a2=0 a3=0 items=0 ppid=1647 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.694533 kernel: audit: type=1327 audit(1712947482.668:769): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.692000 audit[2840]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.692000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffac7228d0 a2=0 a3=7fffac7228bc items=0 ppid=1647 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.706449 kernel: audit: type=1325 audit(1712947482.692:770): table=filter:81 family=2 entries=32 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.706537 kernel: audit: type=1300 audit(1712947482.692:770): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffac7228d0 a2=0 a3=7fffac7228bc items=0 ppid=1647 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.706560 kernel: audit: type=1327 audit(1712947482.692:770): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.699000 audit[2840]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.699000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffac7228d0 a2=0 a3=0 items=0 ppid=1647 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.714367 kernel: audit: type=1325 audit(1712947482.699:771): table=nat:82 family=2 entries=20 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.768401 env[1120]: time="2024-04-12T18:44:42.768355107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d40feebe-3f8e-4d27-8f51-40f3295ecd64,Namespace:default,Attempt:0,}" Apr 12 18:44:42.879691 systemd-networkd[1026]: cali60e51b789ff: Link UP Apr 12 18:44:42.881703 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:44:42.881753 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 18:44:42.881871 systemd-networkd[1026]: cali60e51b789ff: Gained carrier Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.810 [INFO][2842] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.39-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default d40feebe-3f8e-4d27-8f51-40f3295ecd64 1084 0 2024-04-12 18:44:42 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.39 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.39-k8s-nfs--server--provisioner--0-" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.811 [INFO][2842] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.836 [INFO][2855] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" HandleID="k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Workload="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.845 [INFO][2855] ipam_plugin.go 268: Auto assigning IP ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" HandleID="k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Workload="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00072fe00), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.39", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:44:42.836960797 +0000 UTC"}, Hostname:"10.0.0.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.845 [INFO][2855] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.845 [INFO][2855] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.845 [INFO][2855] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.39' Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.847 [INFO][2855] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.853 [INFO][2855] ipam.go 372: Looking up existing affinities for host host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.857 [INFO][2855] ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.860 [INFO][2855] ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.863 [INFO][2855] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.863 [INFO][2855] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.865 [INFO][2855] ipam.go 1682: Creating new handle: k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.869 [INFO][2855] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.876 [INFO][2855] ipam.go 1216: Successfully claimed IPs: [192.168.23.195/26] block=192.168.23.192/26 handle="k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.876 [INFO][2855] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.195/26] handle="k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" host="10.0.0.39" Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.876 [INFO][2855] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:42.889532 env[1120]: 2024-04-12 18:44:42.876 [INFO][2855] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.23.195/26] IPv6=[] ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" HandleID="k8s-pod-network.16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Workload="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:44:42.891810 env[1120]: 2024-04-12 18:44:42.877 [INFO][2842] k8s.go 385: Populated endpoint ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d40feebe-3f8e-4d27-8f51-40f3295ecd64", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.23.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:42.891810 env[1120]: 2024-04-12 18:44:42.877 [INFO][2842] k8s.go 386: Calico CNI using IPs: [192.168.23.195/32] ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:44:42.891810 env[1120]: 2024-04-12 18:44:42.878 [INFO][2842] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:44:42.891810 env[1120]: 2024-04-12 18:44:42.882 [INFO][2842] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:44:42.891984 env[1120]: 2024-04-12 18:44:42.882 [INFO][2842] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d40feebe-3f8e-4d27-8f51-40f3295ecd64", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.23.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"0e:4a:60:0f:3d:ed", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:42.891984 env[1120]: 2024-04-12 18:44:42.887 [INFO][2842] k8s.go 498: Wrote updated endpoint to datastore ContainerID="16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:44:42.904976 env[1120]: time="2024-04-12T18:44:42.904897588Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:42.904976 env[1120]: time="2024-04-12T18:44:42.904931514Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:42.904976 env[1120]: time="2024-04-12T18:44:42.904941332Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:42.905286 env[1120]: time="2024-04-12T18:44:42.905141829Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c pid=2890 runtime=io.containerd.runc.v2 Apr 12 18:44:42.905000 audit[2891]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:42.905000 audit[2891]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffee34cd2b0 a2=0 a3=7ffee34cd29c items=0 ppid=2241 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.905000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:42.910697 kubelet[1423]: E0412 18:44:42.907750 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:42.919770 systemd[1]: Started cri-containerd-16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c.scope. Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit: BPF prog-id=106 op=LOAD Apr 12 18:44:42.933000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.933000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2890 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613065386234383833653064333831393437393738353037346466 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2890 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613065386234383833653064333831393437393738353037346466 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit: BPF prog-id=107 op=LOAD Apr 12 18:44:42.934000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000381d90 items=0 ppid=2890 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613065386234383833653064333831393437393738353037346466 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit: BPF prog-id=108 op=LOAD Apr 12 18:44:42.934000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000381dd8 items=0 ppid=2890 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613065386234383833653064333831393437393738353037346466 Apr 12 18:44:42.934000 audit: BPF prog-id=108 op=UNLOAD Apr 12 18:44:42.934000 audit: BPF prog-id=107 op=UNLOAD Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:42.934000 audit: BPF prog-id=109 op=LOAD Apr 12 18:44:42.934000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f61e8 items=0 ppid=2890 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613065386234383833653064333831393437393738353037346466 Apr 12 18:44:42.935384 systemd-resolved[1068]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:42.959891 env[1120]: time="2024-04-12T18:44:42.959845115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d40feebe-3f8e-4d27-8f51-40f3295ecd64,Namespace:default,Attempt:0,} returns sandbox id \"16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c\"" Apr 12 18:44:42.961801 env[1120]: time="2024-04-12T18:44:42.961771489Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 18:44:43.908286 kubelet[1423]: E0412 18:44:43.908157 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:44.186681 systemd-networkd[1026]: cali60e51b789ff: Gained IPv6LL Apr 12 18:44:44.908576 kubelet[1423]: E0412 18:44:44.908514 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:45.506814 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1108737489.mount: Deactivated successfully. Apr 12 18:44:45.821269 kubelet[1423]: E0412 18:44:45.821143 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:45.828649 env[1120]: time="2024-04-12T18:44:45.828598695Z" level=info msg="StopPodSandbox for \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\"" Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.865 [WARNING][2950] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-csi--node--driver--x7bts-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"38945391-b56f-4a64-a843-457433834294", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9", Pod:"csi-node-driver-x7bts", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid62d5f79854", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.865 [INFO][2950] k8s.go 585: Cleaning up netns ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.865 [INFO][2950] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" iface="eth0" netns="" Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.865 [INFO][2950] k8s.go 592: Releasing IP address(es) ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.865 [INFO][2950] utils.go 188: Calico CNI releasing IP address ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.881 [INFO][2958] ipam_plugin.go 415: Releasing address using handleID ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.882 [INFO][2958] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.882 [INFO][2958] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.887 [WARNING][2958] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.887 [INFO][2958] ipam_plugin.go 443: Releasing address using workloadID ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.889 [INFO][2958] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:45.891085 env[1120]: 2024-04-12 18:44:45.890 [INFO][2950] k8s.go 598: Teardown processing complete. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:45.891647 env[1120]: time="2024-04-12T18:44:45.891127979Z" level=info msg="TearDown network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\" successfully" Apr 12 18:44:45.891647 env[1120]: time="2024-04-12T18:44:45.891165493Z" level=info msg="StopPodSandbox for \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\" returns successfully" Apr 12 18:44:45.891943 env[1120]: time="2024-04-12T18:44:45.891898950Z" level=info msg="RemovePodSandbox for \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\"" Apr 12 18:44:45.891995 env[1120]: time="2024-04-12T18:44:45.891951524Z" level=info msg="Forcibly stopping sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\"" Apr 12 18:44:45.909073 kubelet[1423]: E0412 18:44:45.909023 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.135 [WARNING][2981] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-csi--node--driver--x7bts-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"38945391-b56f-4a64-a843-457433834294", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"85f71e104508c7d20283e2a12013d98d6820163a59ab2d100e497949259e28c9", Pod:"csi-node-driver-x7bts", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid62d5f79854", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.135 [INFO][2981] k8s.go 585: Cleaning up netns ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.135 [INFO][2981] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" iface="eth0" netns="" Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.135 [INFO][2981] k8s.go 592: Releasing IP address(es) ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.135 [INFO][2981] utils.go 188: Calico CNI releasing IP address ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.152 [INFO][2990] ipam_plugin.go 415: Releasing address using handleID ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.152 [INFO][2990] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.152 [INFO][2990] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.159 [WARNING][2990] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.159 [INFO][2990] ipam_plugin.go 443: Releasing address using workloadID ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" HandleID="k8s-pod-network.394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Workload="10.0.0.39-k8s-csi--node--driver--x7bts-eth0" Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.161 [INFO][2990] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:46.163776 env[1120]: 2024-04-12 18:44:46.162 [INFO][2981] k8s.go 598: Teardown processing complete. ContainerID="394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b" Apr 12 18:44:46.164387 env[1120]: time="2024-04-12T18:44:46.163815851Z" level=info msg="TearDown network for sandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\" successfully" Apr 12 18:44:46.619024 env[1120]: time="2024-04-12T18:44:46.618876176Z" level=info msg="RemovePodSandbox \"394c8c89650c34f0ff1e16da51d679b884948947ae6364790fc38f7436cccf5b\" returns successfully" Apr 12 18:44:46.619765 env[1120]: time="2024-04-12T18:44:46.619688496Z" level=info msg="StopPodSandbox for \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\"" Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.677 [WARNING][3013] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c40a4791-fe20-4d08-b234-b81c340f85af", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7", Pod:"nginx-deployment-6d5f899847-ftwd2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0a5575cf3ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.677 [INFO][3013] k8s.go 585: Cleaning up netns ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.677 [INFO][3013] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" iface="eth0" netns="" Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.677 [INFO][3013] k8s.go 592: Releasing IP address(es) ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.677 [INFO][3013] utils.go 188: Calico CNI releasing IP address ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.703 [INFO][3021] ipam_plugin.go 415: Releasing address using handleID ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.703 [INFO][3021] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.703 [INFO][3021] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.710 [WARNING][3021] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.710 [INFO][3021] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.711 [INFO][3021] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:46.713963 env[1120]: 2024-04-12 18:44:46.712 [INFO][3013] k8s.go 598: Teardown processing complete. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:46.714471 env[1120]: time="2024-04-12T18:44:46.714054843Z" level=info msg="TearDown network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\" successfully" Apr 12 18:44:46.714471 env[1120]: time="2024-04-12T18:44:46.714106364Z" level=info msg="StopPodSandbox for \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\" returns successfully" Apr 12 18:44:46.714749 env[1120]: time="2024-04-12T18:44:46.714711188Z" level=info msg="RemovePodSandbox for \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\"" Apr 12 18:44:46.714812 env[1120]: time="2024-04-12T18:44:46.714757227Z" level=info msg="Forcibly stopping sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\"" Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.752 [WARNING][3045] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c40a4791-fe20-4d08-b234-b81c340f85af", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"0c9ffa552c3d28f69a83ee60b3ca662c2f8a3ced4183418e052e23dc8a214cd7", Pod:"nginx-deployment-6d5f899847-ftwd2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0a5575cf3ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.752 [INFO][3045] k8s.go 585: Cleaning up netns ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.752 [INFO][3045] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" iface="eth0" netns="" Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.752 [INFO][3045] k8s.go 592: Releasing IP address(es) ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.752 [INFO][3045] utils.go 188: Calico CNI releasing IP address ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.776 [INFO][3052] ipam_plugin.go 415: Releasing address using handleID ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.776 [INFO][3052] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.776 [INFO][3052] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.782 [WARNING][3052] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.782 [INFO][3052] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" HandleID="k8s-pod-network.f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Workload="10.0.0.39-k8s-nginx--deployment--6d5f899847--ftwd2-eth0" Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.783 [INFO][3052] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:46.786131 env[1120]: 2024-04-12 18:44:46.785 [INFO][3045] k8s.go 598: Teardown processing complete. ContainerID="f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46" Apr 12 18:44:46.786709 env[1120]: time="2024-04-12T18:44:46.786207352Z" level=info msg="TearDown network for sandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\" successfully" Apr 12 18:44:46.811724 env[1120]: time="2024-04-12T18:44:46.811648639Z" level=info msg="RemovePodSandbox \"f1e21e719c4f8c3f0b8d3a4d6a8cf0df9b5eeecdf376937a1b70660265f72a46\" returns successfully" Apr 12 18:44:46.910096 kubelet[1423]: E0412 18:44:46.910042 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:47.910678 kubelet[1423]: E0412 18:44:47.910623 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:48.850341 env[1120]: time="2024-04-12T18:44:48.850247876Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:48.852403 env[1120]: time="2024-04-12T18:44:48.852372146Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:48.854126 env[1120]: time="2024-04-12T18:44:48.854079210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:48.855724 env[1120]: time="2024-04-12T18:44:48.855679667Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:48.856453 env[1120]: time="2024-04-12T18:44:48.856416016Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Apr 12 18:44:48.859513 env[1120]: time="2024-04-12T18:44:48.859447758Z" level=info msg="CreateContainer within sandbox \"16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 18:44:48.874642 env[1120]: time="2024-04-12T18:44:48.874518721Z" level=info msg="CreateContainer within sandbox \"16a0e8b4883e0d3819479785074df47464638e601b8f6e61fd96a258eb31ad4c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"dfb4081f9a28949d27ce5826aa69bdbe278e04831d1afe5962e8ef67cf5b7d6c\"" Apr 12 18:44:48.875135 env[1120]: time="2024-04-12T18:44:48.875105217Z" level=info msg="StartContainer for \"dfb4081f9a28949d27ce5826aa69bdbe278e04831d1afe5962e8ef67cf5b7d6c\"" Apr 12 18:44:48.895074 systemd[1]: Started cri-containerd-dfb4081f9a28949d27ce5826aa69bdbe278e04831d1afe5962e8ef67cf5b7d6c.scope. Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.910361 kernel: kauditd_printk_skb: 62 callbacks suppressed Apr 12 18:44:48.910490 kernel: audit: type=1400 audit(1712947488.904:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.910523 kernel: audit: type=1400 audit(1712947488.904:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.912411 kubelet[1423]: E0412 18:44:48.912374 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:48.915143 kernel: audit: type=1400 audit(1712947488.904:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.915202 kernel: audit: type=1400 audit(1712947488.904:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.921440 kernel: audit: type=1400 audit(1712947488.904:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.925080 kernel: audit: type=1400 audit(1712947488.904:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.925131 kernel: audit: type=1400 audit(1712947488.904:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.931805 kernel: audit: type=1400 audit(1712947488.904:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.931858 kernel: audit: type=1400 audit(1712947488.904:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.938312 kernel: audit: type=1400 audit(1712947488.908:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit: BPF prog-id=110 op=LOAD Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2890 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:48.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623430383166396132383934396432376365353832366161363962 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2890 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:48.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623430383166396132383934396432376365353832366161363962 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.908000 audit: BPF prog-id=111 op=LOAD Apr 12 18:44:48.908000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024cc30 items=0 ppid=2890 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:48.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623430383166396132383934396432376365353832366161363962 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.913000 audit: BPF prog-id=112 op=LOAD Apr 12 18:44:48.913000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024cc78 items=0 ppid=2890 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:48.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623430383166396132383934396432376365353832366161363962 Apr 12 18:44:48.916000 audit: BPF prog-id=112 op=UNLOAD Apr 12 18:44:48.916000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:48.916000 audit: BPF prog-id=113 op=LOAD Apr 12 18:44:48.916000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024d088 items=0 ppid=2890 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:48.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623430383166396132383934396432376365353832366161363962 Apr 12 18:44:48.951740 env[1120]: time="2024-04-12T18:44:48.951690383Z" level=info msg="StartContainer for \"dfb4081f9a28949d27ce5826aa69bdbe278e04831d1afe5962e8ef67cf5b7d6c\" returns successfully" Apr 12 18:44:48.995000 audit[3103]: AVC avc: denied { search } for pid=3103 comm="rpcbind" name="crypto" dev="proc" ino=24657 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:44:48.995000 audit[3103]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0a9ee500c0 a2=0 a3=0 items=0 ppid=3084 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 key=(null) Apr 12 18:44:48.995000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 18:44:49.031000 audit[3108]: AVC avc: denied { search } for pid=3108 comm="dbus-daemon" name="crypto" dev="proc" ino=24657 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:44:49.031000 audit[3108]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f108f3030c0 a2=0 a3=0 items=0 ppid=3084 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 key=(null) Apr 12 18:44:49.031000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:44:49.034000 audit[3109]: AVC avc: denied { watch } for pid=3109 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538024 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c580,c1005 tclass=dir permissive=0 Apr 12 18:44:49.034000 audit[3109]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55a1d20f80b0 a2=2c8 a3=7ffe4f03910c items=0 ppid=3084 pid=3109 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 key=(null) Apr 12 18:44:49.034000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:44:49.037000 audit[3110]: AVC avc: denied { read } for pid=3110 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22830 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 18:44:49.037000 audit[3110]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7ffa98480320 a1=80000 a2=d a3=7ffce9129820 items=0 ppid=3084 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 key=(null) Apr 12 18:44:49.037000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:44:49.039000 audit[3110]: AVC avc: denied { search } for pid=3110 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24657 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:44:49.039000 audit[3110]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ffa979d40c0 a2=0 a3=0 items=0 ppid=3084 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c1005 key=(null) Apr 12 18:44:49.039000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:44:49.179941 kubelet[1423]: I0412 18:44:49.179867 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.284261094 podCreationTimestamp="2024-04-12 18:44:42 +0000 UTC" firstStartedPulling="2024-04-12 18:44:42.961219755 +0000 UTC m=+57.533471181" lastFinishedPulling="2024-04-12 18:44:48.856751421 +0000 UTC m=+63.429002847" observedRunningTime="2024-04-12 18:44:49.179467555 +0000 UTC m=+63.751718981" watchObservedRunningTime="2024-04-12 18:44:49.17979276 +0000 UTC m=+63.752044186" Apr 12 18:44:49.192000 audit[3131]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:49.192000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffefb0480c0 a2=0 a3=7ffefb0480ac items=0 ppid=1647 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:49.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:49.194000 audit[3131]: NETFILTER_CFG table=nat:85 family=2 entries=104 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:49.194000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffefb0480c0 a2=0 a3=7ffefb0480ac items=0 ppid=1647 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:49.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:49.912947 kubelet[1423]: E0412 18:44:49.912864 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:50.913676 kubelet[1423]: E0412 18:44:50.913614 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:51.914773 kubelet[1423]: E0412 18:44:51.914707 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:52.915184 kubelet[1423]: E0412 18:44:52.915139 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:53.915388 kubelet[1423]: E0412 18:44:53.915340 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:54.916070 kubelet[1423]: E0412 18:44:54.916002 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:55.916930 kubelet[1423]: E0412 18:44:55.916885 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:56.917211 kubelet[1423]: E0412 18:44:56.917179 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:57.918228 kubelet[1423]: E0412 18:44:57.918170 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:58.918794 kubelet[1423]: E0412 18:44:58.918699 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:44:59.294676 kubelet[1423]: I0412 18:44:59.294553 1423 topology_manager.go:215] "Topology Admit Handler" podUID="2531a35e-1979-4edd-9bb1-5e55d0489de4" podNamespace="default" podName="test-pod-1" Apr 12 18:44:59.299305 systemd[1]: Created slice kubepods-besteffort-pod2531a35e_1979_4edd_9bb1_5e55d0489de4.slice. Apr 12 18:44:59.407611 kubelet[1423]: I0412 18:44:59.407548 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-9ae869c5-c2a0-4b45-998f-58f1a9c71c25\" (UniqueName: \"kubernetes.io/nfs/2531a35e-1979-4edd-9bb1-5e55d0489de4-pvc-9ae869c5-c2a0-4b45-998f-58f1a9c71c25\") pod \"test-pod-1\" (UID: \"2531a35e-1979-4edd-9bb1-5e55d0489de4\") " pod="default/test-pod-1" Apr 12 18:44:59.407611 kubelet[1423]: I0412 18:44:59.407617 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9wflc\" (UniqueName: \"kubernetes.io/projected/2531a35e-1979-4edd-9bb1-5e55d0489de4-kube-api-access-9wflc\") pod \"test-pod-1\" (UID: \"2531a35e-1979-4edd-9bb1-5e55d0489de4\") " pod="default/test-pod-1" Apr 12 18:44:59.516000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.521196 kernel: Failed to create system directory netfs Apr 12 18:44:59.521247 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 18:44:59.521268 kernel: audit: type=1400 audit(1712947499.516:816): avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.521291 kernel: Failed to create system directory netfs Apr 12 18:44:59.521307 kernel: audit: type=1400 audit(1712947499.516:816): avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.516000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.516000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.532980 kernel: Failed to create system directory netfs Apr 12 18:44:59.533024 kernel: audit: type=1400 audit(1712947499.516:816): avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.533041 kernel: Failed to create system directory netfs Apr 12 18:44:59.533058 kernel: audit: type=1400 audit(1712947499.516:816): avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.516000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.516000 audit[3149]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cb349ed5e0 a1=153bc a2=55cb3429f2b0 a3=5 items=0 ppid=71 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:59.538355 kernel: audit: type=1300 audit(1712947499.516:816): arch=c000003e syscall=175 success=yes exit=0 a0=55cb349ed5e0 a1=153bc a2=55cb3429f2b0 a3=5 items=0 ppid=71 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:59.516000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:44:59.544144 kernel: audit: type=1327 audit(1712947499.516:816): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:44:59.544196 kernel: Failed to create system directory fscache Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.545036 kernel: audit: type=1400 audit(1712947499.540:817): avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.545105 kernel: Failed to create system directory fscache Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.552476 kernel: audit: type=1400 audit(1712947499.540:817): avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.552530 kernel: Failed to create system directory fscache Apr 12 18:44:59.552560 kernel: audit: type=1400 audit(1712947499.540:817): avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.556789 kernel: Failed to create system directory fscache Apr 12 18:44:59.556838 kernel: audit: type=1400 audit(1712947499.540:817): avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.557521 kernel: Failed to create system directory fscache Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.562936 kernel: Failed to create system directory fscache Apr 12 18:44:59.562982 kernel: Failed to create system directory fscache Apr 12 18:44:59.563003 kernel: Failed to create system directory fscache Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.564398 kernel: Failed to create system directory fscache Apr 12 18:44:59.564428 kernel: Failed to create system directory fscache Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.565841 kernel: Failed to create system directory fscache Apr 12 18:44:59.565876 kernel: Failed to create system directory fscache Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.540000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.568026 kernel: Failed to create system directory fscache Apr 12 18:44:59.568070 kernel: Failed to create system directory fscache Apr 12 18:44:59.540000 audit[3149]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cb34c029c0 a1=4c0fc a2=55cb3429f2b0 a3=5 items=0 ppid=71 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:59.540000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:44:59.570347 kernel: FS-Cache: Loaded Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.599926 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.600001 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.600029 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.601503 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.601549 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.602984 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.603018 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.604546 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.605418 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.605449 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.606872 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.606901 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.608345 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.608375 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.609814 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.609837 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.612143 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.612194 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.612215 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.613664 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.613696 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.615883 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.615913 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.615944 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.617378 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.617415 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.618840 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.618880 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.620366 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.620404 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.621843 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.621884 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.623352 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.623399 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.624841 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.624882 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.626348 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.626373 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.627816 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.627871 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.629495 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.629540 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.630980 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.631017 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.632489 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.632528 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.633954 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.633992 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.635460 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.635497 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.637001 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.637047 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.638637 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.639455 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.639505 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.640981 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.641036 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.642474 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.642516 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.643944 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.643978 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.645437 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.645488 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.646928 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.646973 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.648441 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.648482 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.649911 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.649949 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.651414 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.651455 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.652892 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.652925 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.654386 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.654410 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.655844 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.655872 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.657354 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.657400 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.658832 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.658863 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.661055 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.661102 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.661128 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.662582 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.662612 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.664038 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.664073 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.665531 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.665574 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.667054 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.667096 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.668604 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.668638 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.670874 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.670918 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.670949 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.672492 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.672550 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.673996 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.674041 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.674903 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.678078 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.678137 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.679587 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.679636 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.681083 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.681137 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.682646 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.682690 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.684924 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.684970 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.684995 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.686451 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.686492 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.687947 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.687990 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.689485 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.689541 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.691002 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.691053 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.692567 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.692606 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.694070 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.694115 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.588000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.695611 kernel: Failed to create system directory sunrpc Apr 12 18:44:59.705737 kernel: RPC: Registered named UNIX socket transport module. Apr 12 18:44:59.705803 kernel: RPC: Registered udp transport module. Apr 12 18:44:59.705832 kernel: RPC: Registered tcp transport module. Apr 12 18:44:59.706545 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 18:44:59.588000 audit[3149]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cb34c4ead0 a1=1a7e9c a2=55cb3429f2b0 a3=5 items=6 ppid=71 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:59.588000 audit: CWD cwd="/" Apr 12 18:44:59.588000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:59.588000 audit: PATH item=1 name=(null) inode=24262 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:59.588000 audit: PATH item=2 name=(null) inode=24262 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:59.588000 audit: PATH item=3 name=(null) inode=24263 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:59.588000 audit: PATH item=4 name=(null) inode=24262 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:59.588000 audit: PATH item=5 name=(null) inode=24264 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:59.588000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.742407 kernel: Failed to create system directory nfs Apr 12 18:44:59.742463 kernel: Failed to create system directory nfs Apr 12 18:44:59.742490 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.743835 kernel: Failed to create system directory nfs Apr 12 18:44:59.743875 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.745985 kernel: Failed to create system directory nfs Apr 12 18:44:59.746022 kernel: Failed to create system directory nfs Apr 12 18:44:59.746044 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.747436 kernel: Failed to create system directory nfs Apr 12 18:44:59.747482 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.748861 kernel: Failed to create system directory nfs Apr 12 18:44:59.748903 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.750993 kernel: Failed to create system directory nfs Apr 12 18:44:59.751041 kernel: Failed to create system directory nfs Apr 12 18:44:59.751064 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.752453 kernel: Failed to create system directory nfs Apr 12 18:44:59.752494 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.753870 kernel: Failed to create system directory nfs Apr 12 18:44:59.753911 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.756010 kernel: Failed to create system directory nfs Apr 12 18:44:59.756048 kernel: Failed to create system directory nfs Apr 12 18:44:59.756072 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.757493 kernel: Failed to create system directory nfs Apr 12 18:44:59.757550 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.758912 kernel: Failed to create system directory nfs Apr 12 18:44:59.758954 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.760351 kernel: Failed to create system directory nfs Apr 12 18:44:59.760374 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.761789 kernel: Failed to create system directory nfs Apr 12 18:44:59.761834 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.763861 kernel: Failed to create system directory nfs Apr 12 18:44:59.763898 kernel: Failed to create system directory nfs Apr 12 18:44:59.763913 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.765954 kernel: Failed to create system directory nfs Apr 12 18:44:59.765982 kernel: Failed to create system directory nfs Apr 12 18:44:59.766005 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.767380 kernel: Failed to create system directory nfs Apr 12 18:44:59.767400 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.768759 kernel: Failed to create system directory nfs Apr 12 18:44:59.768793 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.770850 kernel: Failed to create system directory nfs Apr 12 18:44:59.770896 kernel: Failed to create system directory nfs Apr 12 18:44:59.770926 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.773183 kernel: Failed to create system directory nfs Apr 12 18:44:59.773222 kernel: Failed to create system directory nfs Apr 12 18:44:59.773251 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.774618 kernel: Failed to create system directory nfs Apr 12 18:44:59.774658 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.776737 kernel: Failed to create system directory nfs Apr 12 18:44:59.776772 kernel: Failed to create system directory nfs Apr 12 18:44:59.776801 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.778855 kernel: Failed to create system directory nfs Apr 12 18:44:59.778889 kernel: Failed to create system directory nfs Apr 12 18:44:59.778912 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.780959 kernel: Failed to create system directory nfs Apr 12 18:44:59.780995 kernel: Failed to create system directory nfs Apr 12 18:44:59.781019 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.782370 kernel: Failed to create system directory nfs Apr 12 18:44:59.782424 kernel: Failed to create system directory nfs Apr 12 18:44:59.734000 audit[3149]: AVC avc: denied { confidentiality } for pid=3149 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.734000 audit[3149]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cb34e6f670 a1=16d85c a2=55cb3429f2b0 a3=5 items=0 ppid=71 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:59.804366 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 18:44:59.734000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.841837 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.841894 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.841927 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.842594 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.843989 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.844030 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.845444 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.845495 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.846871 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.846915 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.849025 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.849070 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.849098 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.850477 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.850523 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.851900 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.851947 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.853358 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.853410 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.854765 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.854811 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.856897 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.856928 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.856967 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.858471 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.858519 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.859891 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.859937 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.862037 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.862096 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.862120 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.863493 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.863542 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.864898 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.864935 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.866356 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.866400 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.867753 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.867792 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.869878 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.869911 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.869930 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.872002 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.872040 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.872063 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.873424 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.873468 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.874833 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.874866 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.876961 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.877003 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.877033 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.878403 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.878429 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.879820 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.879861 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.881955 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.881980 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.881994 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.883402 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.883432 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.884820 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.884849 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.886951 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.886977 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.886994 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.888397 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.888422 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.889812 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.889837 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.891959 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.891984 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.892001 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.893398 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.893422 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.894819 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.894838 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.896957 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.896976 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.897002 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.898405 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.898430 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.899827 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.899850 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.901989 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.902039 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.902056 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.903450 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.903476 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.904851 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.904874 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.906982 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.907033 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.907054 kernel: Failed to create system directory nfs4 Apr 12 18:44:59.829000 audit[3154]: AVC avc: denied { confidentiality } for pid=3154 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:44:59.919524 kubelet[1423]: E0412 18:44:59.919488 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:45:00.046430 kernel: NFS: Registering the id_resolver key type Apr 12 18:45:00.046551 kernel: Key type id_resolver registered Apr 12 18:45:00.046576 kernel: Key type id_legacy registered Apr 12 18:44:59.829000 audit[3154]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1fa9c11010 a1=208ac4 a2=5609907ad2b0 a3=5 items=0 ppid=71 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:59.829000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.060461 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.060518 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.060543 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.061986 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.062027 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.063522 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.063556 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.065006 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.065058 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.066534 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.066567 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.068030 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.068061 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.069563 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.069605 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.071053 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.071083 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.072606 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.072652 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.074921 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.074968 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.074988 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.076412 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.076451 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.077870 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.077908 kernel: Failed to create system directory rpcgss Apr 12 18:45:00.054000 audit[3155]: AVC avc: denied { confidentiality } for pid=3155 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:45:00.054000 audit[3155]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f57a9672010 a1=70c3c a2=56071242e2b0 a3=5 items=0 ppid=71 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.054000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 18:45:00.090346 nfsidmap[3162]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Apr 12 18:45:00.092844 nfsidmap[3165]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Apr 12 18:45:00.100000 audit[1176]: AVC avc: denied { watch_reads } for pid=1176 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:45:00.100000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:45:00.100000 audit[1176]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e64640cce0 a2=10 a3=8f1580955da84f2a items=0 ppid=1 pid=1176 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.100000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:45:00.100000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:45:00.100000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:45:00.100000 audit[1176]: AVC avc: denied { watch_reads } for pid=1176 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:45:00.100000 audit[1176]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e64640cce0 a2=10 a3=8f1580955da84f2a items=0 ppid=1 pid=1176 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.100000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:45:00.100000 audit[1176]: AVC avc: denied { watch_reads } for pid=1176 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:45:00.100000 audit[1176]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e64640cce0 a2=10 a3=8f1580955da84f2a items=0 ppid=1 pid=1176 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.100000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:45:00.201838 env[1120]: time="2024-04-12T18:45:00.201791495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2531a35e-1979-4edd-9bb1-5e55d0489de4,Namespace:default,Attempt:0,}" Apr 12 18:45:00.300852 systemd-networkd[1026]: cali5ec59c6bf6e: Link UP Apr 12 18:45:00.303113 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:45:00.303192 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 18:45:00.303421 systemd-networkd[1026]: cali5ec59c6bf6e: Gained carrier Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.246 [INFO][3169] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.39-k8s-test--pod--1-eth0 default 2531a35e-1979-4edd-9bb1-5e55d0489de4 1153 0 2024-04-12 18:44:42 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.39 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.39-k8s-test--pod--1-" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.246 [INFO][3169] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.39-k8s-test--pod--1-eth0" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.267 [INFO][3182] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" HandleID="k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Workload="10.0.0.39-k8s-test--pod--1-eth0" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.275 [INFO][3182] ipam_plugin.go 268: Auto assigning IP ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" HandleID="k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Workload="10.0.0.39-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000263610), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.39", "pod":"test-pod-1", "timestamp":"2024-04-12 18:45:00.267230747 +0000 UTC"}, Hostname:"10.0.0.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.276 [INFO][3182] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.276 [INFO][3182] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.276 [INFO][3182] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.39' Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.277 [INFO][3182] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.281 [INFO][3182] ipam.go 372: Looking up existing affinities for host host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.284 [INFO][3182] ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.286 [INFO][3182] ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.287 [INFO][3182] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.287 [INFO][3182] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.289 [INFO][3182] ipam.go 1682: Creating new handle: k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49 Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.291 [INFO][3182] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.297 [INFO][3182] ipam.go 1216: Successfully claimed IPs: [192.168.23.196/26] block=192.168.23.192/26 handle="k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.297 [INFO][3182] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.196/26] handle="k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" host="10.0.0.39" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.297 [INFO][3182] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.297 [INFO][3182] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.23.196/26] IPv6=[] ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" HandleID="k8s-pod-network.a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Workload="10.0.0.39-k8s-test--pod--1-eth0" Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.299 [INFO][3169] k8s.go 385: Populated endpoint ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.39-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2531a35e-1979-4edd-9bb1-5e55d0489de4", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:45:00.310298 env[1120]: 2024-04-12 18:45:00.299 [INFO][3169] k8s.go 386: Calico CNI using IPs: [192.168.23.196/32] ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.39-k8s-test--pod--1-eth0" Apr 12 18:45:00.311215 env[1120]: 2024-04-12 18:45:00.299 [INFO][3169] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.39-k8s-test--pod--1-eth0" Apr 12 18:45:00.311215 env[1120]: 2024-04-12 18:45:00.303 [INFO][3169] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.39-k8s-test--pod--1-eth0" Apr 12 18:45:00.311215 env[1120]: 2024-04-12 18:45:00.304 [INFO][3169] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.39-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2531a35e-1979-4edd-9bb1-5e55d0489de4", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"3e:e7:f1:ff:8e:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:45:00.311215 env[1120]: 2024-04-12 18:45:00.308 [INFO][3169] k8s.go 498: Wrote updated endpoint to datastore ContainerID="a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.39-k8s-test--pod--1-eth0" Apr 12 18:45:00.320000 audit[3204]: NETFILTER_CFG table=filter:86 family=2 entries=38 op=nft_register_chain pid=3204 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:45:00.320000 audit[3204]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffcd5b18750 a2=0 a3=7ffcd5b1873c items=0 ppid=2241 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.320000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:45:00.323728 env[1120]: time="2024-04-12T18:45:00.323656397Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:45:00.323728 env[1120]: time="2024-04-12T18:45:00.323700612Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:45:00.323728 env[1120]: time="2024-04-12T18:45:00.323713918Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:45:00.323923 env[1120]: time="2024-04-12T18:45:00.323854209Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49 pid=3212 runtime=io.containerd.runc.v2 Apr 12 18:45:00.336234 systemd[1]: Started cri-containerd-a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49.scope. Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.347000 audit: BPF prog-id=114 op=LOAD Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3212 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333766353230316433386661393363336363633132393066383434 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3212 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333766353230316433386661393363336363633132393066383434 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit: BPF prog-id=115 op=LOAD Apr 12 18:45:00.348000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000280e40 items=0 ppid=3212 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333766353230316433386661393363336363633132393066383434 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit: BPF prog-id=116 op=LOAD Apr 12 18:45:00.348000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000280e88 items=0 ppid=3212 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333766353230316433386661393363336363633132393066383434 Apr 12 18:45:00.348000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:45:00.348000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.348000 audit: BPF prog-id=117 op=LOAD Apr 12 18:45:00.348000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000281298 items=0 ppid=3212 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333766353230316433386661393363336363633132393066383434 Apr 12 18:45:00.350874 systemd-resolved[1068]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:45:00.372494 env[1120]: time="2024-04-12T18:45:00.372437567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2531a35e-1979-4edd-9bb1-5e55d0489de4,Namespace:default,Attempt:0,} returns sandbox id \"a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49\"" Apr 12 18:45:00.374171 env[1120]: time="2024-04-12T18:45:00.374144895Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:45:00.779309 env[1120]: time="2024-04-12T18:45:00.779241482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:00.781645 env[1120]: time="2024-04-12T18:45:00.781598746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:00.783260 env[1120]: time="2024-04-12T18:45:00.783228775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:00.785079 env[1120]: time="2024-04-12T18:45:00.785032640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:00.785748 env[1120]: time="2024-04-12T18:45:00.785710550Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 18:45:00.787240 env[1120]: time="2024-04-12T18:45:00.787217100Z" level=info msg="CreateContainer within sandbox \"a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 18:45:00.800310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1042356282.mount: Deactivated successfully. Apr 12 18:45:00.802920 env[1120]: time="2024-04-12T18:45:00.802869589Z" level=info msg="CreateContainer within sandbox \"a537f5201d38fa93c3ccc1290f844ed3d7fb1a6d45810aa84ff3727e1c18bf49\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"333b316c9d256a21b5982f0813ad1ac0779f57d658eab0362b6cd4deadd6ec85\"" Apr 12 18:45:00.803561 env[1120]: time="2024-04-12T18:45:00.803510557Z" level=info msg="StartContainer for \"333b316c9d256a21b5982f0813ad1ac0779f57d658eab0362b6cd4deadd6ec85\"" Apr 12 18:45:00.821090 systemd[1]: Started cri-containerd-333b316c9d256a21b5982f0813ad1ac0779f57d658eab0362b6cd4deadd6ec85.scope. Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit: BPF prog-id=118 op=LOAD Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3212 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333336233313663396432353661323162353938326630383133616431 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3212 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333336233313663396432353661323162353938326630383133616431 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit: BPF prog-id=119 op=LOAD Apr 12 18:45:00.831000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000288d10 items=0 ppid=3212 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333336233313663396432353661323162353938326630383133616431 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.831000 audit: BPF prog-id=120 op=LOAD Apr 12 18:45:00.831000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000288d58 items=0 ppid=3212 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333336233313663396432353661323162353938326630383133616431 Apr 12 18:45:00.832000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:45:00.832000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:00.832000 audit: BPF prog-id=121 op=LOAD Apr 12 18:45:00.832000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000289168 items=0 ppid=3212 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:00.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333336233313663396432353661323162353938326630383133616431 Apr 12 18:45:00.850086 env[1120]: time="2024-04-12T18:45:00.850043424Z" level=info msg="StartContainer for \"333b316c9d256a21b5982f0813ad1ac0779f57d658eab0362b6cd4deadd6ec85\" returns successfully" Apr 12 18:45:00.919725 kubelet[1423]: E0412 18:45:00.919624 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:45:01.920208 kubelet[1423]: E0412 18:45:01.920137 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:45:01.993000 audit[3303]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=3303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:01.993000 audit[3303]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff64243980 a2=0 a3=7fff6424396c items=0 ppid=1647 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:01.994000 audit[3303]: NETFILTER_CFG table=nat:88 family=2 entries=44 op=nft_register_rule pid=3303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:01.994000 audit[3303]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7fff64243980 a2=0 a3=7fff6424396c items=0 ppid=1647 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.994000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:02.004000 audit[3305]: NETFILTER_CFG table=filter:89 family=2 entries=10 op=nft_register_rule pid=3305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:02.004000 audit[3305]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdc3ef48b0 a2=0 a3=7ffdc3ef489c items=0 ppid=1647 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:02.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:02.005000 audit[3305]: NETFILTER_CFG table=nat:90 family=2 entries=44 op=nft_register_rule pid=3305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:02.005000 audit[3305]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffdc3ef48b0 a2=0 a3=7ffdc3ef489c items=0 ppid=1647 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:02.005000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:02.016392 kubelet[1423]: I0412 18:45:02.016359 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.6040416 podCreationTimestamp="2024-04-12 18:44:42 +0000 UTC" firstStartedPulling="2024-04-12 18:45:00.373759491 +0000 UTC m=+74.946010917" lastFinishedPulling="2024-04-12 18:45:00.786020578 +0000 UTC m=+75.358272004" observedRunningTime="2024-04-12 18:45:01.199211402 +0000 UTC m=+75.771462838" watchObservedRunningTime="2024-04-12 18:45:02.016302687 +0000 UTC m=+76.588554103" Apr 12 18:45:02.016654 kubelet[1423]: I0412 18:45:02.016636 1423 topology_manager.go:215] "Topology Admit Handler" podUID="f62fba3c-82d4-42f0-808d-3499cc473252" podNamespace="calico-apiserver" podName="calico-apiserver-565b87c9b4-jx84q" Apr 12 18:45:02.021160 systemd[1]: Created slice kubepods-besteffort-podf62fba3c_82d4_42f0_808d_3499cc473252.slice. Apr 12 18:45:02.123033 kubelet[1423]: I0412 18:45:02.122992 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f62fba3c-82d4-42f0-808d-3499cc473252-calico-apiserver-certs\") pod \"calico-apiserver-565b87c9b4-jx84q\" (UID: \"f62fba3c-82d4-42f0-808d-3499cc473252\") " pod="calico-apiserver/calico-apiserver-565b87c9b4-jx84q" Apr 12 18:45:02.123033 kubelet[1423]: I0412 18:45:02.123038 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2twqk\" (UniqueName: \"kubernetes.io/projected/f62fba3c-82d4-42f0-808d-3499cc473252-kube-api-access-2twqk\") pod \"calico-apiserver-565b87c9b4-jx84q\" (UID: \"f62fba3c-82d4-42f0-808d-3499cc473252\") " pod="calico-apiserver/calico-apiserver-565b87c9b4-jx84q" Apr 12 18:45:02.170556 systemd-networkd[1026]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 18:45:02.223873 kubelet[1423]: E0412 18:45:02.223819 1423 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:45:02.224159 kubelet[1423]: E0412 18:45:02.223954 1423 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f62fba3c-82d4-42f0-808d-3499cc473252-calico-apiserver-certs podName:f62fba3c-82d4-42f0-808d-3499cc473252 nodeName:}" failed. No retries permitted until 2024-04-12 18:45:02.723892583 +0000 UTC m=+77.296144009 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/f62fba3c-82d4-42f0-808d-3499cc473252-calico-apiserver-certs") pod "calico-apiserver-565b87c9b4-jx84q" (UID: "f62fba3c-82d4-42f0-808d-3499cc473252") : secret "calico-apiserver-certs" not found Apr 12 18:45:02.920841 kubelet[1423]: E0412 18:45:02.920781 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:45:02.923690 env[1120]: time="2024-04-12T18:45:02.923643920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-565b87c9b4-jx84q,Uid:f62fba3c-82d4-42f0-808d-3499cc473252,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:45:03.021787 systemd-networkd[1026]: cali5778eaabe6b: Link UP Apr 12 18:45:03.024290 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:45:03.024369 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5778eaabe6b: link becomes ready Apr 12 18:45:03.024552 systemd-networkd[1026]: cali5778eaabe6b: Gained carrier Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:02.964 [INFO][3309] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0 calico-apiserver-565b87c9b4- calico-apiserver f62fba3c-82d4-42f0-808d-3499cc473252 1209 0 2024-04-12 18:45:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:565b87c9b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.39 calico-apiserver-565b87c9b4-jx84q eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5778eaabe6b [] []}} ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-jx84q" WorkloadEndpoint="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:02.964 [INFO][3309] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-jx84q" WorkloadEndpoint="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:02.987 [INFO][3322] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" HandleID="k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Workload="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:02.997 [INFO][3322] ipam_plugin.go 268: Auto assigning IP ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" HandleID="k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Workload="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b4320), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.39", "pod":"calico-apiserver-565b87c9b4-jx84q", "timestamp":"2024-04-12 18:45:02.987222886 +0000 UTC"}, Hostname:"10.0.0.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:02.997 [INFO][3322] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:02.997 [INFO][3322] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:02.997 [INFO][3322] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.39' Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:02.998 [INFO][3322] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.002 [INFO][3322] ipam.go 372: Looking up existing affinities for host host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.006 [INFO][3322] ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.007 [INFO][3322] ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.009 [INFO][3322] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.009 [INFO][3322] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.011 [INFO][3322] ipam.go 1682: Creating new handle: k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329 Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.014 [INFO][3322] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.018 [INFO][3322] ipam.go 1216: Successfully claimed IPs: [192.168.23.197/26] block=192.168.23.192/26 handle="k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.018 [INFO][3322] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.197/26] handle="k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" host="10.0.0.39" Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.018 [INFO][3322] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:45:03.032000 env[1120]: 2024-04-12 18:45:03.018 [INFO][3322] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.23.197/26] IPv6=[] ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" HandleID="k8s-pod-network.ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Workload="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" Apr 12 18:45:03.032598 env[1120]: 2024-04-12 18:45:03.020 [INFO][3309] k8s.go 385: Populated endpoint ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-jx84q" WorkloadEndpoint="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0", GenerateName:"calico-apiserver-565b87c9b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"f62fba3c-82d4-42f0-808d-3499cc473252", ResourceVersion:"1209", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"565b87c9b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"", Pod:"calico-apiserver-565b87c9b4-jx84q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.23.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5778eaabe6b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:45:03.032598 env[1120]: 2024-04-12 18:45:03.020 [INFO][3309] k8s.go 386: Calico CNI using IPs: [192.168.23.197/32] ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-jx84q" WorkloadEndpoint="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" Apr 12 18:45:03.032598 env[1120]: 2024-04-12 18:45:03.020 [INFO][3309] dataplane_linux.go 68: Setting the host side veth name to cali5778eaabe6b ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-jx84q" WorkloadEndpoint="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" Apr 12 18:45:03.032598 env[1120]: 2024-04-12 18:45:03.024 [INFO][3309] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-jx84q" WorkloadEndpoint="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" Apr 12 18:45:03.032598 env[1120]: 2024-04-12 18:45:03.025 [INFO][3309] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-jx84q" WorkloadEndpoint="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0", GenerateName:"calico-apiserver-565b87c9b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"f62fba3c-82d4-42f0-808d-3499cc473252", ResourceVersion:"1209", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"565b87c9b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.39", ContainerID:"ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329", Pod:"calico-apiserver-565b87c9b4-jx84q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.23.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5778eaabe6b", MAC:"ce:ec:df:e4:d0:5e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:45:03.032598 env[1120]: 2024-04-12 18:45:03.030 [INFO][3309] k8s.go 498: Wrote updated endpoint to datastore ContainerID="ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-jx84q" WorkloadEndpoint="10.0.0.39-k8s-calico--apiserver--565b87c9b4--jx84q-eth0" Apr 12 18:45:03.047941 env[1120]: time="2024-04-12T18:45:03.047757835Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:45:03.047941 env[1120]: time="2024-04-12T18:45:03.047793695Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:45:03.047941 env[1120]: time="2024-04-12T18:45:03.047804105Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:45:03.048172 env[1120]: time="2024-04-12T18:45:03.047939256Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329 pid=3355 runtime=io.containerd.runc.v2 Apr 12 18:45:03.046000 audit[3356]: NETFILTER_CFG table=filter:91 family=2 entries=65 op=nft_register_chain pid=3356 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:45:03.046000 audit[3356]: SYSCALL arch=c000003e syscall=46 success=yes exit=32992 a0=3 a1=7ffc20bbe840 a2=0 a3=7ffc20bbe82c items=0 ppid=2241 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.046000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:45:03.061041 systemd[1]: Started cri-containerd-ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329.scope. Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.071000 audit: BPF prog-id=122 op=LOAD Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3355 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666346139396431636433613731633363333035303638643634333936 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3355 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666346139396431636433613731633363333035303638643634333936 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit: BPF prog-id=123 op=LOAD Apr 12 18:45:03.072000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024b20 items=0 ppid=3355 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666346139396431636433613731633363333035303638643634333936 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit: BPF prog-id=124 op=LOAD Apr 12 18:45:03.072000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024b68 items=0 ppid=3355 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666346139396431636433613731633363333035303638643634333936 Apr 12 18:45:03.072000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:45:03.072000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.072000 audit: BPF prog-id=125 op=LOAD Apr 12 18:45:03.072000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024f78 items=0 ppid=3355 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666346139396431636433613731633363333035303638643634333936 Apr 12 18:45:03.074752 systemd-resolved[1068]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:45:03.097401 env[1120]: time="2024-04-12T18:45:03.097355012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-565b87c9b4-jx84q,Uid:f62fba3c-82d4-42f0-808d-3499cc473252,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329\"" Apr 12 18:45:03.098679 env[1120]: time="2024-04-12T18:45:03.098650209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:45:03.731813 systemd[1]: run-containerd-runc-k8s.io-ff4a99d1cd3a71c3c305068d64396acba99501cc8fc1736ad397b00358711329-runc.m9JIk7.mount: Deactivated successfully. Apr 12 18:45:03.921310 kubelet[1423]: E0412 18:45:03.921246 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:45:04.541174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2761754257.mount: Deactivated successfully. Apr 12 18:45:04.794617 systemd-networkd[1026]: cali5778eaabe6b: Gained IPv6LL Apr 12 18:45:04.921937 kubelet[1423]: E0412 18:45:04.921887 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"