Feb 8 23:22:28.002390 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 8 23:22:28.002420 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:22:28.002434 kernel: BIOS-provided physical RAM map: Feb 8 23:22:28.002444 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 8 23:22:28.002453 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 8 23:22:28.002463 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 8 23:22:28.002477 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 8 23:22:28.002488 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 8 23:22:28.002498 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 8 23:22:28.002508 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 8 23:22:28.002519 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 8 23:22:28.009575 kernel: printk: bootconsole [earlyser0] enabled Feb 8 23:22:28.009593 kernel: NX (Execute Disable) protection: active Feb 8 23:22:28.009604 kernel: efi: EFI v2.70 by Microsoft Feb 8 23:22:28.009624 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 Feb 8 23:22:28.009631 kernel: random: crng init done Feb 8 23:22:28.009638 kernel: SMBIOS 3.1.0 present. Feb 8 23:22:28.009644 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 8 23:22:28.009650 kernel: Hypervisor detected: Microsoft Hyper-V Feb 8 23:22:28.009656 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 8 23:22:28.009662 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 8 23:22:28.011329 kernel: Hyper-V: Nested features: 0x1e0101 Feb 8 23:22:28.011346 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 8 23:22:28.011358 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 8 23:22:28.011368 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 8 23:22:28.011383 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 8 23:22:28.011395 kernel: tsc: Detected 2593.907 MHz processor Feb 8 23:22:28.011405 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 8 23:22:28.011414 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 8 23:22:28.011424 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 8 23:22:28.011435 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 8 23:22:28.011445 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 8 23:22:28.011458 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 8 23:22:28.011470 kernel: Using GB pages for direct mapping Feb 8 23:22:28.011481 kernel: Secure boot disabled Feb 8 23:22:28.011491 kernel: ACPI: Early table checksum verification disabled Feb 8 23:22:28.011502 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 8 23:22:28.011513 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011525 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011551 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 8 23:22:28.011572 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 8 23:22:28.011585 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011598 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011610 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011623 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011636 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011653 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011663 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:22:28.011674 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 8 23:22:28.011684 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 8 23:22:28.011695 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 8 23:22:28.011708 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 8 23:22:28.011720 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 8 23:22:28.011733 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 8 23:22:28.011749 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 8 23:22:28.011761 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 8 23:22:28.011773 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 8 23:22:28.011786 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 8 23:22:28.011799 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 8 23:22:28.011812 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 8 23:22:28.011826 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 8 23:22:28.011840 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 8 23:22:28.011854 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 8 23:22:28.011871 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 8 23:22:28.011885 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 8 23:22:28.011898 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 8 23:22:28.011911 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 8 23:22:28.011922 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 8 23:22:28.011936 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 8 23:22:28.011948 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 8 23:22:28.011959 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 8 23:22:28.011972 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 8 23:22:28.011988 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 8 23:22:28.012000 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 8 23:22:28.012011 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 8 23:22:28.012023 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 8 23:22:28.012049 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 8 23:22:28.012058 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 8 23:22:28.012068 kernel: Zone ranges: Feb 8 23:22:28.012078 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 8 23:22:28.012086 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 8 23:22:28.012098 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 8 23:22:28.012105 kernel: Movable zone start for each node Feb 8 23:22:28.012115 kernel: Early memory node ranges Feb 8 23:22:28.012124 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 8 23:22:28.012132 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 8 23:22:28.012139 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 8 23:22:28.012148 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 8 23:22:28.012157 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 8 23:22:28.012165 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 8 23:22:28.012176 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 8 23:22:28.012184 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 8 23:22:28.012194 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 8 23:22:28.012201 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 8 23:22:28.012209 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 8 23:22:28.012218 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 8 23:22:28.012228 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 8 23:22:28.012235 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 8 23:22:28.012244 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 8 23:22:28.012254 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 8 23:22:28.012264 kernel: Booting paravirtualized kernel on Hyper-V Feb 8 23:22:28.012271 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 8 23:22:28.012281 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 8 23:22:28.012288 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 8 23:22:28.012297 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 8 23:22:28.012304 kernel: pcpu-alloc: [0] 0 1 Feb 8 23:22:28.012314 kernel: Hyper-V: PV spinlocks enabled Feb 8 23:22:28.012321 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 8 23:22:28.012333 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 8 23:22:28.012339 kernel: Policy zone: Normal Feb 8 23:22:28.012350 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:22:28.012360 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 8 23:22:28.012368 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 8 23:22:28.012375 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 8 23:22:28.012384 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 8 23:22:28.012394 kernel: Memory: 8081200K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved) Feb 8 23:22:28.012403 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 8 23:22:28.012413 kernel: ftrace: allocating 34475 entries in 135 pages Feb 8 23:22:28.012431 kernel: ftrace: allocated 135 pages with 4 groups Feb 8 23:22:28.012440 kernel: rcu: Hierarchical RCU implementation. Feb 8 23:22:28.012451 kernel: rcu: RCU event tracing is enabled. Feb 8 23:22:28.012460 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 8 23:22:28.012469 kernel: Rude variant of Tasks RCU enabled. Feb 8 23:22:28.012477 kernel: Tracing variant of Tasks RCU enabled. Feb 8 23:22:28.012487 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 8 23:22:28.012497 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 8 23:22:28.012505 kernel: Using NULL legacy PIC Feb 8 23:22:28.012518 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 8 23:22:28.012526 kernel: Console: colour dummy device 80x25 Feb 8 23:22:28.012545 kernel: printk: console [tty1] enabled Feb 8 23:22:28.012555 kernel: printk: console [ttyS0] enabled Feb 8 23:22:28.012565 kernel: printk: bootconsole [earlyser0] disabled Feb 8 23:22:28.012575 kernel: ACPI: Core revision 20210730 Feb 8 23:22:28.012585 kernel: Failed to register legacy timer interrupt Feb 8 23:22:28.012594 kernel: APIC: Switch to symmetric I/O mode setup Feb 8 23:22:28.012603 kernel: Hyper-V: Using IPI hypercalls Feb 8 23:22:28.012611 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593907) Feb 8 23:22:28.012620 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 8 23:22:28.012628 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 8 23:22:28.012638 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 8 23:22:28.012646 kernel: Spectre V2 : Mitigation: Retpolines Feb 8 23:22:28.012655 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 8 23:22:28.012667 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 8 23:22:28.012676 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 8 23:22:28.012683 kernel: RETBleed: Vulnerable Feb 8 23:22:28.012693 kernel: Speculative Store Bypass: Vulnerable Feb 8 23:22:28.012703 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 8 23:22:28.012711 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 8 23:22:28.012718 kernel: GDS: Unknown: Dependent on hypervisor status Feb 8 23:22:28.012728 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 8 23:22:28.012737 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 8 23:22:28.012745 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 8 23:22:28.012758 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 8 23:22:28.012766 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 8 23:22:28.012776 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 8 23:22:28.012783 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 8 23:22:28.012793 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 8 23:22:28.012802 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 8 23:22:28.012811 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 8 23:22:28.012818 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 8 23:22:28.012828 kernel: Freeing SMP alternatives memory: 32K Feb 8 23:22:28.012837 kernel: pid_max: default: 32768 minimum: 301 Feb 8 23:22:28.012845 kernel: LSM: Security Framework initializing Feb 8 23:22:28.012852 kernel: SELinux: Initializing. Feb 8 23:22:28.012865 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 8 23:22:28.012876 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 8 23:22:28.012883 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 8 23:22:28.012892 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 8 23:22:28.012901 kernel: signal: max sigframe size: 3632 Feb 8 23:22:28.012911 kernel: rcu: Hierarchical SRCU implementation. Feb 8 23:22:28.012918 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 8 23:22:28.012928 kernel: smp: Bringing up secondary CPUs ... Feb 8 23:22:28.012936 kernel: x86: Booting SMP configuration: Feb 8 23:22:28.012946 kernel: .... node #0, CPUs: #1 Feb 8 23:22:28.012956 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 8 23:22:28.012966 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 8 23:22:28.012977 kernel: smp: Brought up 1 node, 2 CPUs Feb 8 23:22:28.012984 kernel: smpboot: Max logical packages: 1 Feb 8 23:22:28.012993 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 8 23:22:28.013002 kernel: devtmpfs: initialized Feb 8 23:22:28.013012 kernel: x86/mm: Memory block size: 128MB Feb 8 23:22:28.013019 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 8 23:22:28.013031 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 8 23:22:28.013040 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 8 23:22:28.013048 kernel: pinctrl core: initialized pinctrl subsystem Feb 8 23:22:28.013056 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 8 23:22:28.013066 kernel: audit: initializing netlink subsys (disabled) Feb 8 23:22:28.013076 kernel: audit: type=2000 audit(1707434546.023:1): state=initialized audit_enabled=0 res=1 Feb 8 23:22:28.013083 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 8 23:22:28.013092 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 8 23:22:28.013101 kernel: cpuidle: using governor menu Feb 8 23:22:28.013113 kernel: ACPI: bus type PCI registered Feb 8 23:22:28.013120 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 8 23:22:28.013130 kernel: dca service started, version 1.12.1 Feb 8 23:22:28.013138 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 8 23:22:28.013148 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 8 23:22:28.013155 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 8 23:22:28.013169 kernel: ACPI: Added _OSI(Module Device) Feb 8 23:22:28.013178 kernel: ACPI: Added _OSI(Processor Device) Feb 8 23:22:28.013187 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 8 23:22:28.013197 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 8 23:22:28.013207 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 8 23:22:28.013217 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 8 23:22:28.013225 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 8 23:22:28.013234 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 8 23:22:28.013243 kernel: ACPI: Interpreter enabled Feb 8 23:22:28.013253 kernel: ACPI: PM: (supports S0 S5) Feb 8 23:22:28.013261 kernel: ACPI: Using IOAPIC for interrupt routing Feb 8 23:22:28.013270 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 8 23:22:28.013283 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 8 23:22:28.013291 kernel: iommu: Default domain type: Translated Feb 8 23:22:28.013299 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 8 23:22:28.013309 kernel: vgaarb: loaded Feb 8 23:22:28.013318 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 8 23:22:28.013327 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 8 23:22:28.013335 kernel: PTP clock support registered Feb 8 23:22:28.013344 kernel: Registered efivars operations Feb 8 23:22:28.013354 kernel: PCI: Using ACPI for IRQ routing Feb 8 23:22:28.013362 kernel: PCI: System does not support PCI Feb 8 23:22:28.013374 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 8 23:22:28.013382 kernel: VFS: Disk quotas dquot_6.6.0 Feb 8 23:22:28.013391 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 8 23:22:28.013399 kernel: pnp: PnP ACPI init Feb 8 23:22:28.013409 kernel: pnp: PnP ACPI: found 3 devices Feb 8 23:22:28.013418 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 8 23:22:28.013427 kernel: NET: Registered PF_INET protocol family Feb 8 23:22:28.013434 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 8 23:22:28.013447 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 8 23:22:28.013457 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 8 23:22:28.013464 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 8 23:22:28.013475 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 8 23:22:28.013483 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 8 23:22:28.013493 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 8 23:22:28.013500 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 8 23:22:28.013510 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 8 23:22:28.013519 kernel: NET: Registered PF_XDP protocol family Feb 8 23:22:28.013535 kernel: PCI: CLS 0 bytes, default 64 Feb 8 23:22:28.013546 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 8 23:22:28.013555 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 8 23:22:28.013563 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 8 23:22:28.013572 kernel: Initialise system trusted keyrings Feb 8 23:22:28.013581 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 8 23:22:28.013591 kernel: Key type asymmetric registered Feb 8 23:22:28.013598 kernel: Asymmetric key parser 'x509' registered Feb 8 23:22:28.013607 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 8 23:22:28.013618 kernel: io scheduler mq-deadline registered Feb 8 23:22:28.013628 kernel: io scheduler kyber registered Feb 8 23:22:28.013635 kernel: io scheduler bfq registered Feb 8 23:22:28.013645 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 8 23:22:28.013654 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 8 23:22:28.013663 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 8 23:22:28.013670 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 8 23:22:28.013680 kernel: i8042: PNP: No PS/2 controller found. Feb 8 23:22:28.013809 kernel: rtc_cmos 00:02: registered as rtc0 Feb 8 23:22:28.013901 kernel: rtc_cmos 00:02: setting system clock to 2024-02-08T23:22:27 UTC (1707434547) Feb 8 23:22:28.013982 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 8 23:22:28.013993 kernel: fail to initialize ptp_kvm Feb 8 23:22:28.014004 kernel: intel_pstate: CPU model not supported Feb 8 23:22:28.014011 kernel: efifb: probing for efifb Feb 8 23:22:28.014021 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 8 23:22:28.014029 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 8 23:22:28.014039 kernel: efifb: scrolling: redraw Feb 8 23:22:28.014049 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 8 23:22:28.014059 kernel: Console: switching to colour frame buffer device 128x48 Feb 8 23:22:28.014070 kernel: fb0: EFI VGA frame buffer device Feb 8 23:22:28.014077 kernel: pstore: Registered efi as persistent store backend Feb 8 23:22:28.014086 kernel: NET: Registered PF_INET6 protocol family Feb 8 23:22:28.014095 kernel: Segment Routing with IPv6 Feb 8 23:22:28.014105 kernel: In-situ OAM (IOAM) with IPv6 Feb 8 23:22:28.014113 kernel: NET: Registered PF_PACKET protocol family Feb 8 23:22:28.014124 kernel: Key type dns_resolver registered Feb 8 23:22:28.014135 kernel: IPI shorthand broadcast: enabled Feb 8 23:22:28.014143 kernel: sched_clock: Marking stable (700774100, 19608400)->(879892900, -159510400) Feb 8 23:22:28.014151 kernel: registered taskstats version 1 Feb 8 23:22:28.014161 kernel: Loading compiled-in X.509 certificates Feb 8 23:22:28.014171 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 8 23:22:28.014178 kernel: Key type .fscrypt registered Feb 8 23:22:28.014187 kernel: Key type fscrypt-provisioning registered Feb 8 23:22:28.014196 kernel: pstore: Using crash dump compression: deflate Feb 8 23:22:28.014208 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 8 23:22:28.014215 kernel: ima: Allocated hash algorithm: sha1 Feb 8 23:22:28.014226 kernel: ima: No architecture policies found Feb 8 23:22:28.014234 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 8 23:22:28.014243 kernel: Write protecting the kernel read-only data: 28672k Feb 8 23:22:28.014251 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 8 23:22:28.014261 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 8 23:22:28.014271 kernel: Run /init as init process Feb 8 23:22:28.014279 kernel: with arguments: Feb 8 23:22:28.014290 kernel: /init Feb 8 23:22:28.014299 kernel: with environment: Feb 8 23:22:28.014306 kernel: HOME=/ Feb 8 23:22:28.014313 kernel: TERM=linux Feb 8 23:22:28.014320 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 8 23:22:28.014332 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 8 23:22:28.014349 systemd[1]: Detected virtualization microsoft. Feb 8 23:22:28.014361 systemd[1]: Detected architecture x86-64. Feb 8 23:22:28.014370 systemd[1]: Running in initrd. Feb 8 23:22:28.014383 systemd[1]: No hostname configured, using default hostname. Feb 8 23:22:28.014399 systemd[1]: Hostname set to . Feb 8 23:22:28.014416 systemd[1]: Initializing machine ID from random generator. Feb 8 23:22:28.014431 systemd[1]: Queued start job for default target initrd.target. Feb 8 23:22:28.014442 systemd[1]: Started systemd-ask-password-console.path. Feb 8 23:22:28.014449 systemd[1]: Reached target cryptsetup.target. Feb 8 23:22:28.014462 systemd[1]: Reached target paths.target. Feb 8 23:22:28.014478 systemd[1]: Reached target slices.target. Feb 8 23:22:28.014496 systemd[1]: Reached target swap.target. Feb 8 23:22:28.014511 systemd[1]: Reached target timers.target. Feb 8 23:22:28.014523 systemd[1]: Listening on iscsid.socket. Feb 8 23:22:28.014544 systemd[1]: Listening on iscsiuio.socket. Feb 8 23:22:28.014559 systemd[1]: Listening on systemd-journald-audit.socket. Feb 8 23:22:28.014573 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 8 23:22:28.014581 systemd[1]: Listening on systemd-journald.socket. Feb 8 23:22:28.014597 systemd[1]: Listening on systemd-networkd.socket. Feb 8 23:22:28.014613 systemd[1]: Listening on systemd-udevd-control.socket. Feb 8 23:22:28.014627 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 8 23:22:28.014636 systemd[1]: Reached target sockets.target. Feb 8 23:22:28.014644 systemd[1]: Starting kmod-static-nodes.service... Feb 8 23:22:28.014660 systemd[1]: Finished network-cleanup.service. Feb 8 23:22:28.014675 systemd[1]: Starting systemd-fsck-usr.service... Feb 8 23:22:28.014687 systemd[1]: Starting systemd-journald.service... Feb 8 23:22:28.014695 systemd[1]: Starting systemd-modules-load.service... Feb 8 23:22:28.014710 systemd[1]: Starting systemd-resolved.service... Feb 8 23:22:28.014727 systemd[1]: Starting systemd-vconsole-setup.service... Feb 8 23:22:28.014742 systemd[1]: Finished kmod-static-nodes.service. Feb 8 23:22:28.014757 systemd-journald[183]: Journal started Feb 8 23:22:28.014816 systemd-journald[183]: Runtime Journal (/run/log/journal/12ca756739ee4d72aab34b2d4af588ad) is 8.0M, max 159.0M, 151.0M free. Feb 8 23:22:28.008811 systemd-modules-load[184]: Inserted module 'overlay' Feb 8 23:22:28.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.033543 kernel: audit: type=1130 audit(1707434548.021:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.033561 systemd[1]: Started systemd-journald.service. Feb 8 23:22:28.050100 systemd-resolved[185]: Positive Trust Anchors: Feb 8 23:22:28.052107 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 8 23:22:28.055442 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 8 23:22:28.069903 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 8 23:22:28.077303 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 8 23:22:28.077567 systemd[1]: Started systemd-resolved.service. Feb 8 23:22:28.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.081096 systemd[1]: Finished systemd-fsck-usr.service. Feb 8 23:22:28.139851 kernel: Bridge firewalling registered Feb 8 23:22:28.139880 kernel: audit: type=1130 audit(1707434548.076:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.139904 kernel: audit: type=1130 audit(1707434548.080:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.139921 kernel: audit: type=1130 audit(1707434548.095:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.139938 kernel: audit: type=1130 audit(1707434548.116:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.095631 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 8 23:22:28.095797 systemd[1]: Finished systemd-vconsole-setup.service. Feb 8 23:22:28.117143 systemd[1]: Reached target nss-lookup.target. Feb 8 23:22:28.118026 systemd[1]: Starting dracut-cmdline-ask.service... Feb 8 23:22:28.120779 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 8 23:22:28.141115 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 8 23:22:28.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.167008 kernel: audit: type=1130 audit(1707434548.142:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.167036 kernel: SCSI subsystem initialized Feb 8 23:22:28.166986 systemd[1]: Finished dracut-cmdline-ask.service. Feb 8 23:22:28.172640 systemd[1]: Starting dracut-cmdline.service... Feb 8 23:22:28.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.185445 dracut-cmdline[201]: dracut-dracut-053 Feb 8 23:22:28.194190 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:22:28.206581 kernel: audit: type=1130 audit(1707434548.170:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.224864 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 8 23:22:28.224898 kernel: device-mapper: uevent: version 1.0.3 Feb 8 23:22:28.229994 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 8 23:22:28.233876 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 8 23:22:28.236465 systemd[1]: Finished systemd-modules-load.service. Feb 8 23:22:28.238961 systemd[1]: Starting systemd-sysctl.service... Feb 8 23:22:28.255337 kernel: audit: type=1130 audit(1707434548.237:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.259842 systemd[1]: Finished systemd-sysctl.service. Feb 8 23:22:28.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.273544 kernel: audit: type=1130 audit(1707434548.262:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.276547 kernel: Loading iSCSI transport class v2.0-870. Feb 8 23:22:28.289549 kernel: iscsi: registered transport (tcp) Feb 8 23:22:28.314906 kernel: iscsi: registered transport (qla4xxx) Feb 8 23:22:28.314946 kernel: QLogic iSCSI HBA Driver Feb 8 23:22:28.343513 systemd[1]: Finished dracut-cmdline.service. Feb 8 23:22:28.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.346586 systemd[1]: Starting dracut-pre-udev.service... Feb 8 23:22:28.397547 kernel: raid6: avx512x4 gen() 18511 MB/s Feb 8 23:22:28.418546 kernel: raid6: avx512x4 xor() 8683 MB/s Feb 8 23:22:28.438544 kernel: raid6: avx512x2 gen() 18691 MB/s Feb 8 23:22:28.458546 kernel: raid6: avx512x2 xor() 29983 MB/s Feb 8 23:22:28.478543 kernel: raid6: avx512x1 gen() 18685 MB/s Feb 8 23:22:28.498540 kernel: raid6: avx512x1 xor() 27180 MB/s Feb 8 23:22:28.518542 kernel: raid6: avx2x4 gen() 18645 MB/s Feb 8 23:22:28.538545 kernel: raid6: avx2x4 xor() 8141 MB/s Feb 8 23:22:28.558541 kernel: raid6: avx2x2 gen() 18673 MB/s Feb 8 23:22:28.578543 kernel: raid6: avx2x2 xor() 22356 MB/s Feb 8 23:22:28.598540 kernel: raid6: avx2x1 gen() 14258 MB/s Feb 8 23:22:28.618541 kernel: raid6: avx2x1 xor() 19563 MB/s Feb 8 23:22:28.638541 kernel: raid6: sse2x4 gen() 11767 MB/s Feb 8 23:22:28.658543 kernel: raid6: sse2x4 xor() 7235 MB/s Feb 8 23:22:28.678540 kernel: raid6: sse2x2 gen() 12985 MB/s Feb 8 23:22:28.698539 kernel: raid6: sse2x2 xor() 7475 MB/s Feb 8 23:22:28.719543 kernel: raid6: sse2x1 gen() 11740 MB/s Feb 8 23:22:28.742727 kernel: raid6: sse2x1 xor() 5929 MB/s Feb 8 23:22:28.742753 kernel: raid6: using algorithm avx512x2 gen() 18691 MB/s Feb 8 23:22:28.742767 kernel: raid6: .... xor() 29983 MB/s, rmw enabled Feb 8 23:22:28.746154 kernel: raid6: using avx512x2 recovery algorithm Feb 8 23:22:28.764547 kernel: xor: automatically using best checksumming function avx Feb 8 23:22:28.858551 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 8 23:22:28.866769 systemd[1]: Finished dracut-pre-udev.service. Feb 8 23:22:28.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.869000 audit: BPF prog-id=7 op=LOAD Feb 8 23:22:28.869000 audit: BPF prog-id=8 op=LOAD Feb 8 23:22:28.870982 systemd[1]: Starting systemd-udevd.service... Feb 8 23:22:28.885192 systemd-udevd[385]: Using default interface naming scheme 'v252'. Feb 8 23:22:28.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.891695 systemd[1]: Started systemd-udevd.service. Feb 8 23:22:28.894504 systemd[1]: Starting dracut-pre-trigger.service... Feb 8 23:22:28.913765 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Feb 8 23:22:28.942547 systemd[1]: Finished dracut-pre-trigger.service. Feb 8 23:22:28.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:28.947502 systemd[1]: Starting systemd-udev-trigger.service... Feb 8 23:22:28.979738 systemd[1]: Finished systemd-udev-trigger.service. Feb 8 23:22:28.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:29.027548 kernel: cryptd: max_cpu_qlen set to 1000 Feb 8 23:22:29.044717 kernel: hv_vmbus: Vmbus version:5.2 Feb 8 23:22:29.055544 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 8 23:22:29.080894 kernel: hv_vmbus: registering driver hv_storvsc Feb 8 23:22:29.080929 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 8 23:22:29.087551 kernel: hv_vmbus: registering driver hv_netvsc Feb 8 23:22:29.091545 kernel: AVX2 version of gcm_enc/dec engaged. Feb 8 23:22:29.096024 kernel: AES CTR mode by8 optimization enabled Feb 8 23:22:29.096055 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 8 23:22:29.103564 kernel: scsi host1: storvsc_host_t Feb 8 23:22:29.103739 kernel: scsi host0: storvsc_host_t Feb 8 23:22:29.105862 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 8 23:22:29.116545 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 8 23:22:29.131545 kernel: hv_vmbus: registering driver hid_hyperv Feb 8 23:22:29.142771 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 8 23:22:29.142812 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 8 23:22:29.165401 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 8 23:22:29.165663 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 8 23:22:29.167554 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 8 23:22:29.174945 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 8 23:22:29.175082 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 8 23:22:29.178034 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 8 23:22:29.178164 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 8 23:22:29.178553 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 8 23:22:29.188551 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 8 23:22:29.193739 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 8 23:22:29.229551 kernel: hv_netvsc 000d3a66-0651-000d-3a66-0651000d3a66 eth0: VF slot 1 added Feb 8 23:22:29.237550 kernel: hv_vmbus: registering driver hv_pci Feb 8 23:22:29.243549 kernel: hv_pci 09ad04a1-fd51-4eb4-a7e6-900c29aaf555: PCI VMBus probing: Using version 0x10004 Feb 8 23:22:29.253675 kernel: hv_pci 09ad04a1-fd51-4eb4-a7e6-900c29aaf555: PCI host bridge to bus fd51:00 Feb 8 23:22:29.253812 kernel: pci_bus fd51:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 8 23:22:29.253938 kernel: pci_bus fd51:00: No busn resource found for root bus, will use [bus 00-ff] Feb 8 23:22:29.265552 kernel: pci fd51:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 8 23:22:29.276775 kernel: pci fd51:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 8 23:22:29.295721 kernel: pci fd51:00:02.0: enabling Extended Tags Feb 8 23:22:29.310785 kernel: pci fd51:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at fd51:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 8 23:22:29.319399 kernel: pci_bus fd51:00: busn_res: [bus 00-ff] end is updated to 00 Feb 8 23:22:29.319547 kernel: pci fd51:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 8 23:22:29.410549 kernel: mlx5_core fd51:00:02.0: firmware version: 14.30.1224 Feb 8 23:22:29.570554 kernel: mlx5_core fd51:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 8 23:22:29.618098 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 8 23:22:29.644551 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (445) Feb 8 23:22:29.657861 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 8 23:22:29.727826 kernel: mlx5_core fd51:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 8 23:22:29.728038 kernel: mlx5_core fd51:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing Feb 8 23:22:29.739499 kernel: hv_netvsc 000d3a66-0651-000d-3a66-0651000d3a66 eth0: VF registering: eth1 Feb 8 23:22:29.739662 kernel: mlx5_core fd51:00:02.0 eth1: joined to eth0 Feb 8 23:22:29.753590 kernel: mlx5_core fd51:00:02.0 enP64849s1: renamed from eth1 Feb 8 23:22:29.824645 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 8 23:22:29.835415 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 8 23:22:29.837900 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 8 23:22:29.843398 systemd[1]: Starting disk-uuid.service... Feb 8 23:22:29.856547 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 8 23:22:29.867546 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 8 23:22:30.875245 disk-uuid[560]: The operation has completed successfully. Feb 8 23:22:30.877684 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 8 23:22:30.948175 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 8 23:22:30.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:30.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:30.948272 systemd[1]: Finished disk-uuid.service. Feb 8 23:22:30.959355 systemd[1]: Starting verity-setup.service... Feb 8 23:22:30.994568 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 8 23:22:31.260283 systemd[1]: Found device dev-mapper-usr.device. Feb 8 23:22:31.264592 systemd[1]: Finished verity-setup.service. Feb 8 23:22:31.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:31.268846 systemd[1]: Mounting sysusr-usr.mount... Feb 8 23:22:31.341559 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 8 23:22:31.340871 systemd[1]: Mounted sysusr-usr.mount. Feb 8 23:22:31.343959 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 8 23:22:31.347616 systemd[1]: Starting ignition-setup.service... Feb 8 23:22:31.350082 systemd[1]: Starting parse-ip-for-networkd.service... Feb 8 23:22:31.366149 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:22:31.366190 kernel: BTRFS info (device sda6): using free space tree Feb 8 23:22:31.366203 kernel: BTRFS info (device sda6): has skinny extents Feb 8 23:22:31.420466 systemd[1]: Finished parse-ip-for-networkd.service. Feb 8 23:22:31.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:31.425000 audit: BPF prog-id=9 op=LOAD Feb 8 23:22:31.427203 systemd[1]: Starting systemd-networkd.service... Feb 8 23:22:31.449906 systemd-networkd[801]: lo: Link UP Feb 8 23:22:31.449915 systemd-networkd[801]: lo: Gained carrier Feb 8 23:22:31.453761 systemd-networkd[801]: Enumeration completed Feb 8 23:22:31.453843 systemd[1]: Started systemd-networkd.service. Feb 8 23:22:31.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:31.458944 systemd[1]: Reached target network.target. Feb 8 23:22:31.462225 systemd-networkd[801]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:22:31.462877 systemd[1]: Starting iscsiuio.service... Feb 8 23:22:31.475260 systemd[1]: Started iscsiuio.service. Feb 8 23:22:31.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:31.477747 systemd[1]: Starting iscsid.service... Feb 8 23:22:31.482819 iscsid[808]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 8 23:22:31.482819 iscsid[808]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 8 23:22:31.482819 iscsid[808]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 8 23:22:31.482819 iscsid[808]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 8 23:22:31.482819 iscsid[808]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 8 23:22:31.482819 iscsid[808]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 8 23:22:31.482819 iscsid[808]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 8 23:22:31.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:31.487700 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 8 23:22:31.488010 systemd[1]: Started iscsid.service. Feb 8 23:22:31.500655 systemd[1]: Starting dracut-initqueue.service... Feb 8 23:22:31.521471 systemd[1]: Finished dracut-initqueue.service. Feb 8 23:22:31.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:31.524891 systemd[1]: Reached target remote-fs-pre.target. Feb 8 23:22:31.528465 systemd[1]: Reached target remote-cryptsetup.target. Feb 8 23:22:31.532243 systemd[1]: Reached target remote-fs.target. Feb 8 23:22:31.536201 systemd[1]: Starting dracut-pre-mount.service... Feb 8 23:22:31.544199 systemd[1]: Finished dracut-pre-mount.service. Feb 8 23:22:31.550437 kernel: mlx5_core fd51:00:02.0 enP64849s1: Link up Feb 8 23:22:31.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:31.621548 kernel: hv_netvsc 000d3a66-0651-000d-3a66-0651000d3a66 eth0: Data path switched to VF: enP64849s1 Feb 8 23:22:31.626588 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:22:31.626836 systemd-networkd[801]: enP64849s1: Link UP Feb 8 23:22:31.627005 systemd-networkd[801]: eth0: Link UP Feb 8 23:22:31.627263 systemd-networkd[801]: eth0: Gained carrier Feb 8 23:22:31.634711 systemd-networkd[801]: enP64849s1: Gained carrier Feb 8 23:22:31.653589 systemd-networkd[801]: eth0: DHCPv4 address 10.200.8.31/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 8 23:22:31.670007 systemd[1]: Finished ignition-setup.service. Feb 8 23:22:31.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:31.673070 systemd[1]: Starting ignition-fetch-offline.service... Feb 8 23:22:33.246787 systemd-networkd[801]: eth0: Gained IPv6LL Feb 8 23:22:35.182418 ignition[825]: Ignition 2.14.0 Feb 8 23:22:35.182433 ignition[825]: Stage: fetch-offline Feb 8 23:22:35.182517 ignition[825]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:35.182605 ignition[825]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:22:35.261689 ignition[825]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:22:35.261853 ignition[825]: parsed url from cmdline: "" Feb 8 23:22:35.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.264060 systemd[1]: Finished ignition-fetch-offline.service. Feb 8 23:22:35.287063 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 8 23:22:35.287095 kernel: audit: type=1130 audit(1707434555.267:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.261857 ignition[825]: no config URL provided Feb 8 23:22:35.268636 systemd[1]: Starting ignition-fetch.service... Feb 8 23:22:35.261862 ignition[825]: reading system config file "/usr/lib/ignition/user.ign" Feb 8 23:22:35.261870 ignition[825]: no config at "/usr/lib/ignition/user.ign" Feb 8 23:22:35.261876 ignition[825]: failed to fetch config: resource requires networking Feb 8 23:22:35.263105 ignition[825]: Ignition finished successfully Feb 8 23:22:35.276627 ignition[831]: Ignition 2.14.0 Feb 8 23:22:35.276634 ignition[831]: Stage: fetch Feb 8 23:22:35.276727 ignition[831]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:35.276751 ignition[831]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:22:35.279917 ignition[831]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:22:35.281120 ignition[831]: parsed url from cmdline: "" Feb 8 23:22:35.281129 ignition[831]: no config URL provided Feb 8 23:22:35.281137 ignition[831]: reading system config file "/usr/lib/ignition/user.ign" Feb 8 23:22:35.281146 ignition[831]: no config at "/usr/lib/ignition/user.ign" Feb 8 23:22:35.281219 ignition[831]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 8 23:22:35.368850 ignition[831]: GET result: OK Feb 8 23:22:35.368950 ignition[831]: config has been read from IMDS userdata Feb 8 23:22:35.368986 ignition[831]: parsing config with SHA512: aef937e2c573799ae98cdf6b86953d47213282ffde7ff784c269554975ea697adaf71e7541377e220dc1fc5020229d40dc3d18416aec3b5c2158d82b8f83ceff Feb 8 23:22:35.387142 unknown[831]: fetched base config from "system" Feb 8 23:22:35.387158 unknown[831]: fetched base config from "system" Feb 8 23:22:35.387167 unknown[831]: fetched user config from "azure" Feb 8 23:22:35.392744 ignition[831]: fetch: fetch complete Feb 8 23:22:35.392754 ignition[831]: fetch: fetch passed Feb 8 23:22:35.392803 ignition[831]: Ignition finished successfully Feb 8 23:22:35.398460 systemd[1]: Finished ignition-fetch.service. Feb 8 23:22:35.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.401200 systemd[1]: Starting ignition-kargs.service... Feb 8 23:22:35.416360 kernel: audit: type=1130 audit(1707434555.400:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.424017 ignition[837]: Ignition 2.14.0 Feb 8 23:22:35.424027 ignition[837]: Stage: kargs Feb 8 23:22:35.424154 ignition[837]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:35.424187 ignition[837]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:22:35.433967 ignition[837]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:22:35.437483 ignition[837]: kargs: kargs passed Feb 8 23:22:35.437551 ignition[837]: Ignition finished successfully Feb 8 23:22:35.440793 systemd[1]: Finished ignition-kargs.service. Feb 8 23:22:35.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.452277 ignition[843]: Ignition 2.14.0 Feb 8 23:22:35.458511 kernel: audit: type=1130 audit(1707434555.444:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.444919 systemd[1]: Starting ignition-disks.service... Feb 8 23:22:35.452283 ignition[843]: Stage: disks Feb 8 23:22:35.452386 ignition[843]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:35.452410 ignition[843]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:22:35.477921 ignition[843]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:22:35.478954 ignition[843]: disks: disks passed Feb 8 23:22:35.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.479664 systemd[1]: Finished ignition-disks.service. Feb 8 23:22:35.498670 kernel: audit: type=1130 audit(1707434555.481:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.478992 ignition[843]: Ignition finished successfully Feb 8 23:22:35.482362 systemd[1]: Reached target initrd-root-device.target. Feb 8 23:22:35.495109 systemd[1]: Reached target local-fs-pre.target. Feb 8 23:22:35.498643 systemd[1]: Reached target local-fs.target. Feb 8 23:22:35.500268 systemd[1]: Reached target sysinit.target. Feb 8 23:22:35.501862 systemd[1]: Reached target basic.target. Feb 8 23:22:35.504213 systemd[1]: Starting systemd-fsck-root.service... Feb 8 23:22:35.564811 systemd-fsck[851]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 8 23:22:35.574187 systemd[1]: Finished systemd-fsck-root.service. Feb 8 23:22:35.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.579332 systemd[1]: Mounting sysroot.mount... Feb 8 23:22:35.592295 kernel: audit: type=1130 audit(1707434555.578:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:35.606409 systemd[1]: Mounted sysroot.mount. Feb 8 23:22:35.611525 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 8 23:22:35.608397 systemd[1]: Reached target initrd-root-fs.target. Feb 8 23:22:35.642648 systemd[1]: Mounting sysroot-usr.mount... Feb 8 23:22:35.645673 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 8 23:22:35.650465 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 8 23:22:35.650503 systemd[1]: Reached target ignition-diskful.target. Feb 8 23:22:35.658941 systemd[1]: Mounted sysroot-usr.mount. Feb 8 23:22:35.707508 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 8 23:22:35.713277 systemd[1]: Starting initrd-setup-root.service... Feb 8 23:22:35.721192 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (862) Feb 8 23:22:35.730355 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:22:35.730389 kernel: BTRFS info (device sda6): using free space tree Feb 8 23:22:35.730403 kernel: BTRFS info (device sda6): has skinny extents Feb 8 23:22:35.736497 initrd-setup-root[867]: cut: /sysroot/etc/passwd: No such file or directory Feb 8 23:22:35.739825 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 8 23:22:35.762995 initrd-setup-root[893]: cut: /sysroot/etc/group: No such file or directory Feb 8 23:22:35.770316 initrd-setup-root[901]: cut: /sysroot/etc/shadow: No such file or directory Feb 8 23:22:35.799061 initrd-setup-root[909]: cut: /sysroot/etc/gshadow: No such file or directory Feb 8 23:22:36.328471 systemd[1]: Finished initrd-setup-root.service. Feb 8 23:22:36.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:36.343905 systemd[1]: Starting ignition-mount.service... Feb 8 23:22:36.347124 kernel: audit: type=1130 audit(1707434556.331:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:36.351417 systemd[1]: Starting sysroot-boot.service... Feb 8 23:22:36.357756 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 8 23:22:36.359911 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 8 23:22:36.381592 ignition[928]: INFO : Ignition 2.14.0 Feb 8 23:22:36.381592 ignition[928]: INFO : Stage: mount Feb 8 23:22:36.381102 systemd[1]: Finished sysroot-boot.service. Feb 8 23:22:36.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:36.389611 ignition[928]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:36.389611 ignition[928]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:22:36.406724 kernel: audit: type=1130 audit(1707434556.386:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:36.409147 ignition[928]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:22:36.409147 ignition[928]: INFO : mount: mount passed Feb 8 23:22:36.409147 ignition[928]: INFO : Ignition finished successfully Feb 8 23:22:36.415414 systemd[1]: Finished ignition-mount.service. Feb 8 23:22:36.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:36.429572 kernel: audit: type=1130 audit(1707434556.418:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:37.170522 coreos-metadata[861]: Feb 08 23:22:37.170 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 8 23:22:37.188454 coreos-metadata[861]: Feb 08 23:22:37.188 INFO Fetch successful Feb 8 23:22:37.222942 coreos-metadata[861]: Feb 08 23:22:37.222 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 8 23:22:37.238761 coreos-metadata[861]: Feb 08 23:22:37.238 INFO Fetch successful Feb 8 23:22:37.253787 coreos-metadata[861]: Feb 08 23:22:37.253 INFO wrote hostname ci-3510.3.2-a-7d5bfcb083 to /sysroot/etc/hostname Feb 8 23:22:37.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:37.255590 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 8 23:22:37.274535 kernel: audit: type=1130 audit(1707434557.258:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:37.260313 systemd[1]: Starting ignition-files.service... Feb 8 23:22:37.277739 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 8 23:22:37.290561 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (940) Feb 8 23:22:37.298720 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:22:37.298753 kernel: BTRFS info (device sda6): using free space tree Feb 8 23:22:37.298767 kernel: BTRFS info (device sda6): has skinny extents Feb 8 23:22:37.306123 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 8 23:22:37.317911 ignition[959]: INFO : Ignition 2.14.0 Feb 8 23:22:37.317911 ignition[959]: INFO : Stage: files Feb 8 23:22:37.321821 ignition[959]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:37.321821 ignition[959]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:22:37.329897 ignition[959]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:22:37.343818 ignition[959]: DEBUG : files: compiled without relabeling support, skipping Feb 8 23:22:37.347188 ignition[959]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 8 23:22:37.347188 ignition[959]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 8 23:22:37.421017 ignition[959]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 8 23:22:37.424916 ignition[959]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 8 23:22:37.436406 unknown[959]: wrote ssh authorized keys file for user: core Feb 8 23:22:37.438800 ignition[959]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 8 23:22:37.457415 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 8 23:22:37.462900 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 8 23:22:38.085339 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 8 23:22:38.300663 ignition[959]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 8 23:22:38.308482 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 8 23:22:38.308482 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 8 23:22:38.308482 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 8 23:22:38.873938 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 8 23:22:38.958847 ignition[959]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 8 23:22:38.966139 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 8 23:22:38.966139 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 8 23:22:38.966139 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 8 23:22:39.164318 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 8 23:22:39.394750 ignition[959]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 8 23:22:39.402480 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 8 23:22:39.402480 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 8 23:22:39.402480 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 8 23:22:39.527036 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 8 23:22:39.927343 ignition[959]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 8 23:22:39.934722 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 8 23:22:39.985043 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem510399506" Feb 8 23:22:39.985043 ignition[959]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem510399506": device or resource busy Feb 8 23:22:39.985043 ignition[959]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem510399506", trying btrfs: device or resource busy Feb 8 23:22:39.985043 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem510399506" Feb 8 23:22:40.005458 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (962) Feb 8 23:22:40.005489 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem510399506" Feb 8 23:22:40.005489 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem510399506" Feb 8 23:22:40.005489 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem510399506" Feb 8 23:22:40.005489 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 8 23:22:40.005489 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 8 23:22:40.005489 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 8 23:22:40.005489 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem26405019" Feb 8 23:22:40.005489 ignition[959]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem26405019": device or resource busy Feb 8 23:22:40.005489 ignition[959]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem26405019", trying btrfs: device or resource busy Feb 8 23:22:40.005489 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem26405019" Feb 8 23:22:40.065395 kernel: audit: type=1130 audit(1707434560.022:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.009596 systemd[1]: mnt-oem26405019.mount: Deactivated successfully. Feb 8 23:22:40.071608 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem26405019" Feb 8 23:22:40.071608 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem26405019" Feb 8 23:22:40.071608 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem26405019" Feb 8 23:22:40.071608 ignition[959]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 8 23:22:40.071608 ignition[959]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 8 23:22:40.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.017642 systemd[1]: Finished ignition-files.service. Feb 8 23:22:40.090572 ignition[959]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Feb 8 23:22:40.090572 ignition[959]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Feb 8 23:22:40.090572 ignition[959]: INFO : files: op(1b): [started] setting preset to enabled for "waagent.service" Feb 8 23:22:40.090572 ignition[959]: INFO : files: op(1b): [finished] setting preset to enabled for "waagent.service" Feb 8 23:22:40.090572 ignition[959]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 8 23:22:40.090572 ignition[959]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 8 23:22:40.090572 ignition[959]: INFO : files: files passed Feb 8 23:22:40.090572 ignition[959]: INFO : Ignition finished successfully Feb 8 23:22:40.039059 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 8 23:22:40.093933 initrd-setup-root-after-ignition[983]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 8 23:22:40.050421 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 8 23:22:40.065294 systemd[1]: Starting ignition-quench.service... Feb 8 23:22:40.073590 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 8 23:22:40.080745 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 8 23:22:40.080827 systemd[1]: Finished ignition-quench.service. Feb 8 23:22:40.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.185276 systemd[1]: Reached target ignition-complete.target. Feb 8 23:22:40.190034 systemd[1]: Starting initrd-parse-etc.service... Feb 8 23:22:40.206560 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 8 23:22:40.206663 systemd[1]: Finished initrd-parse-etc.service. Feb 8 23:22:40.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.212511 systemd[1]: Reached target initrd-fs.target. Feb 8 23:22:40.216183 systemd[1]: Reached target initrd.target. Feb 8 23:22:40.219684 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 8 23:22:40.223215 systemd[1]: Starting dracut-pre-pivot.service... Feb 8 23:22:40.233717 systemd[1]: Finished dracut-pre-pivot.service. Feb 8 23:22:40.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.237972 systemd[1]: Starting initrd-cleanup.service... Feb 8 23:22:40.248916 systemd[1]: Stopped target nss-lookup.target. Feb 8 23:22:40.252904 systemd[1]: Stopped target remote-cryptsetup.target. Feb 8 23:22:40.256978 systemd[1]: Stopped target timers.target. Feb 8 23:22:40.260203 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 8 23:22:40.262629 systemd[1]: Stopped dracut-pre-pivot.service. Feb 8 23:22:40.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.266499 systemd[1]: Stopped target initrd.target. Feb 8 23:22:40.269945 systemd[1]: Stopped target basic.target. Feb 8 23:22:40.273306 systemd[1]: Stopped target ignition-complete.target. Feb 8 23:22:40.277215 systemd[1]: Stopped target ignition-diskful.target. Feb 8 23:22:40.280928 systemd[1]: Stopped target initrd-root-device.target. Feb 8 23:22:40.284924 systemd[1]: Stopped target remote-fs.target. Feb 8 23:22:40.288301 systemd[1]: Stopped target remote-fs-pre.target. Feb 8 23:22:40.292040 systemd[1]: Stopped target sysinit.target. Feb 8 23:22:40.295293 systemd[1]: Stopped target local-fs.target. Feb 8 23:22:40.298815 systemd[1]: Stopped target local-fs-pre.target. Feb 8 23:22:40.302506 systemd[1]: Stopped target swap.target. Feb 8 23:22:40.305685 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 8 23:22:40.307794 systemd[1]: Stopped dracut-pre-mount.service. Feb 8 23:22:40.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.311378 systemd[1]: Stopped target cryptsetup.target. Feb 8 23:22:40.329846 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 8 23:22:40.329882 kernel: audit: type=1131 audit(1707434560.311:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.329941 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 8 23:22:40.332047 systemd[1]: Stopped dracut-initqueue.service. Feb 8 23:22:40.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.335895 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 8 23:22:40.351253 kernel: audit: type=1131 audit(1707434560.335:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.336036 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 8 23:22:40.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.353378 systemd[1]: ignition-files.service: Deactivated successfully. Feb 8 23:22:40.369388 kernel: audit: type=1131 audit(1707434560.353:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.353509 systemd[1]: Stopped ignition-files.service. Feb 8 23:22:40.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.371081 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 8 23:22:40.386128 kernel: audit: type=1131 audit(1707434560.370:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.371224 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 8 23:22:40.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.388953 systemd[1]: Stopping ignition-mount.service... Feb 8 23:22:40.408682 kernel: audit: type=1131 audit(1707434560.387:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.408709 ignition[997]: INFO : Ignition 2.14.0 Feb 8 23:22:40.408709 ignition[997]: INFO : Stage: umount Feb 8 23:22:40.408709 ignition[997]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:40.408709 ignition[997]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:22:40.433166 kernel: audit: type=1131 audit(1707434560.407:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.402284 systemd[1]: Stopping iscsiuio.service... Feb 8 23:22:40.436844 ignition[997]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:22:40.436844 ignition[997]: INFO : umount: umount passed Feb 8 23:22:40.436844 ignition[997]: INFO : Ignition finished successfully Feb 8 23:22:40.463602 kernel: audit: type=1131 audit(1707434560.436:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.463636 kernel: audit: type=1131 audit(1707434560.451:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.403822 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 8 23:22:40.468754 kernel: audit: type=1131 audit(1707434560.466:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.403970 systemd[1]: Stopped kmod-static-nodes.service. Feb 8 23:22:40.410490 systemd[1]: Stopping sysroot-boot.service... Feb 8 23:22:40.499597 kernel: audit: type=1131 audit(1707434560.486:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.427969 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 8 23:22:40.428103 systemd[1]: Stopped systemd-udev-trigger.service. Feb 8 23:22:40.437052 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 8 23:22:40.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.448270 systemd[1]: Stopped dracut-pre-trigger.service. Feb 8 23:22:40.453208 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 8 23:22:40.453299 systemd[1]: Stopped iscsiuio.service. Feb 8 23:22:40.467004 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 8 23:22:40.467083 systemd[1]: Stopped ignition-mount.service. Feb 8 23:22:40.496663 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 8 23:22:40.496803 systemd[1]: Stopped ignition-disks.service. Feb 8 23:22:40.507752 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 8 23:22:40.507824 systemd[1]: Stopped ignition-kargs.service. Feb 8 23:22:40.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.527916 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 8 23:22:40.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.527970 systemd[1]: Stopped ignition-fetch.service. Feb 8 23:22:40.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.531669 systemd[1]: Stopped target network.target. Feb 8 23:22:40.533503 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 8 23:22:40.533587 systemd[1]: Stopped ignition-fetch-offline.service. Feb 8 23:22:40.537067 systemd[1]: Stopped target paths.target. Feb 8 23:22:40.538776 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 8 23:22:40.543571 systemd[1]: Stopped systemd-ask-password-console.path. Feb 8 23:22:40.546840 systemd[1]: Stopped target slices.target. Feb 8 23:22:40.548700 systemd[1]: Stopped target sockets.target. Feb 8 23:22:40.551802 systemd[1]: iscsid.socket: Deactivated successfully. Feb 8 23:22:40.551835 systemd[1]: Closed iscsid.socket. Feb 8 23:22:40.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.554608 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 8 23:22:40.554658 systemd[1]: Closed iscsiuio.socket. Feb 8 23:22:40.564872 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 8 23:22:40.564926 systemd[1]: Stopped ignition-setup.service. Feb 8 23:22:40.568475 systemd[1]: Stopping systemd-networkd.service... Feb 8 23:22:40.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.571957 systemd[1]: Stopping systemd-resolved.service... Feb 8 23:22:40.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.575588 systemd-networkd[801]: eth0: DHCPv6 lease lost Feb 8 23:22:40.577713 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 8 23:22:40.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.578261 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 8 23:22:40.592000 audit: BPF prog-id=9 op=UNLOAD Feb 8 23:22:40.592000 audit: BPF prog-id=6 op=UNLOAD Feb 8 23:22:40.578355 systemd[1]: Stopped systemd-networkd.service. Feb 8 23:22:40.583469 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 8 23:22:40.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.584541 systemd[1]: Stopped systemd-resolved.service. Feb 8 23:22:40.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.588827 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 8 23:22:40.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.588902 systemd[1]: Finished initrd-cleanup.service. Feb 8 23:22:40.593387 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 8 23:22:40.593418 systemd[1]: Closed systemd-networkd.socket. Feb 8 23:22:40.597291 systemd[1]: Stopping network-cleanup.service... Feb 8 23:22:40.599943 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 8 23:22:40.600005 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 8 23:22:40.604003 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 8 23:22:40.604054 systemd[1]: Stopped systemd-sysctl.service. Feb 8 23:22:40.607637 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 8 23:22:40.607685 systemd[1]: Stopped systemd-modules-load.service. Feb 8 23:22:40.612111 systemd[1]: Stopping systemd-udevd.service... Feb 8 23:22:40.634112 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 8 23:22:40.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.634694 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 8 23:22:40.634816 systemd[1]: Stopped systemd-udevd.service. Feb 8 23:22:40.641621 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 8 23:22:40.641662 systemd[1]: Closed systemd-udevd-control.socket. Feb 8 23:22:40.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.645153 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 8 23:22:40.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.645189 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 8 23:22:40.649307 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 8 23:22:40.649360 systemd[1]: Stopped dracut-pre-udev.service. Feb 8 23:22:40.652909 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 8 23:22:40.652956 systemd[1]: Stopped dracut-cmdline.service. Feb 8 23:22:40.656863 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 8 23:22:40.656916 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 8 23:22:40.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.671677 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 8 23:22:40.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.673683 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 8 23:22:40.673744 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 8 23:22:40.682202 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 8 23:22:40.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.682303 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 8 23:22:40.706540 kernel: hv_netvsc 000d3a66-0651-000d-3a66-0651000d3a66 eth0: Data path switched from VF: enP64849s1 Feb 8 23:22:40.725506 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 8 23:22:40.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:40.725631 systemd[1]: Stopped network-cleanup.service. Feb 8 23:22:41.466811 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 8 23:22:41.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:41.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:41.466957 systemd[1]: Stopped sysroot-boot.service. Feb 8 23:22:41.469280 systemd[1]: Reached target initrd-switch-root.target. Feb 8 23:22:41.473021 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 8 23:22:41.473080 systemd[1]: Stopped initrd-setup-root.service. Feb 8 23:22:41.475747 systemd[1]: Starting initrd-switch-root.service... Feb 8 23:22:41.489448 systemd[1]: Switching root. Feb 8 23:22:41.521270 iscsid[808]: iscsid shutting down. Feb 8 23:22:41.522993 systemd-journald[183]: Received SIGTERM from PID 1 (n/a). Feb 8 23:22:41.523050 systemd-journald[183]: Journal stopped Feb 8 23:22:55.798599 kernel: SELinux: Class mctp_socket not defined in policy. Feb 8 23:22:55.798631 kernel: SELinux: Class anon_inode not defined in policy. Feb 8 23:22:55.798643 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 8 23:22:55.798653 kernel: SELinux: policy capability network_peer_controls=1 Feb 8 23:22:55.798661 kernel: SELinux: policy capability open_perms=1 Feb 8 23:22:55.798673 kernel: SELinux: policy capability extended_socket_class=1 Feb 8 23:22:55.798683 kernel: SELinux: policy capability always_check_network=0 Feb 8 23:22:55.798695 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 8 23:22:55.798705 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 8 23:22:55.798715 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 8 23:22:55.798724 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 8 23:22:55.798738 systemd[1]: Successfully loaded SELinux policy in 335.619ms. Feb 8 23:22:55.798751 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.394ms. Feb 8 23:22:55.798762 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 8 23:22:55.798778 systemd[1]: Detected virtualization microsoft. Feb 8 23:22:55.798789 systemd[1]: Detected architecture x86-64. Feb 8 23:22:55.798800 systemd[1]: Detected first boot. Feb 8 23:22:55.798812 systemd[1]: Hostname set to . Feb 8 23:22:55.798823 systemd[1]: Initializing machine ID from random generator. Feb 8 23:22:55.798837 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 8 23:22:55.798846 kernel: kauditd_printk_skb: 32 callbacks suppressed Feb 8 23:22:55.798858 kernel: audit: type=1400 audit(1707434566.231:88): avc: denied { associate } for pid=1031 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 8 23:22:55.798870 kernel: audit: type=1300 audit(1707434566.231:88): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1014 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:55.798881 kernel: audit: type=1327 audit(1707434566.231:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:22:55.798895 kernel: audit: type=1400 audit(1707434566.238:89): avc: denied { associate } for pid=1031 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 8 23:22:55.798907 kernel: audit: type=1300 audit(1707434566.238:89): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1014 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:55.798918 kernel: audit: type=1307 audit(1707434566.238:89): cwd="/" Feb 8 23:22:55.798930 kernel: audit: type=1302 audit(1707434566.238:89): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:55.798943 kernel: audit: type=1302 audit(1707434566.238:89): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:55.798954 kernel: audit: type=1327 audit(1707434566.238:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:22:55.798969 systemd[1]: Populated /etc with preset unit settings. Feb 8 23:22:55.798980 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:22:55.798993 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:22:55.799007 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:22:55.799017 kernel: audit: type=1334 audit(1707434575.324:90): prog-id=12 op=LOAD Feb 8 23:22:55.799029 kernel: audit: type=1334 audit(1707434575.324:91): prog-id=3 op=UNLOAD Feb 8 23:22:55.799037 kernel: audit: type=1334 audit(1707434575.334:92): prog-id=13 op=LOAD Feb 8 23:22:55.799049 kernel: audit: type=1334 audit(1707434575.339:93): prog-id=14 op=LOAD Feb 8 23:22:55.799061 systemd[1]: iscsid.service: Deactivated successfully. Feb 8 23:22:55.799073 kernel: audit: type=1334 audit(1707434575.339:94): prog-id=4 op=UNLOAD Feb 8 23:22:55.799088 kernel: audit: type=1334 audit(1707434575.339:95): prog-id=5 op=UNLOAD Feb 8 23:22:55.799097 kernel: audit: type=1131 audit(1707434575.339:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.799110 systemd[1]: Stopped iscsid.service. Feb 8 23:22:55.799120 kernel: audit: type=1334 audit(1707434575.373:97): prog-id=12 op=UNLOAD Feb 8 23:22:55.799132 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 8 23:22:55.799147 kernel: audit: type=1131 audit(1707434575.375:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.799158 systemd[1]: Stopped initrd-switch-root.service. Feb 8 23:22:55.799171 kernel: audit: type=1130 audit(1707434575.402:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.799181 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 8 23:22:55.799194 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 8 23:22:55.799205 systemd[1]: Created slice system-addon\x2drun.slice. Feb 8 23:22:55.799216 systemd[1]: Created slice system-getty.slice. Feb 8 23:22:55.799228 systemd[1]: Created slice system-modprobe.slice. Feb 8 23:22:55.799242 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 8 23:22:55.799255 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 8 23:22:55.799266 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 8 23:22:55.799278 systemd[1]: Created slice user.slice. Feb 8 23:22:55.799291 systemd[1]: Started systemd-ask-password-console.path. Feb 8 23:22:55.799304 systemd[1]: Started systemd-ask-password-wall.path. Feb 8 23:22:55.799317 systemd[1]: Set up automount boot.automount. Feb 8 23:22:55.799329 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 8 23:22:55.799342 systemd[1]: Stopped target initrd-switch-root.target. Feb 8 23:22:55.799355 systemd[1]: Stopped target initrd-fs.target. Feb 8 23:22:55.799367 systemd[1]: Stopped target initrd-root-fs.target. Feb 8 23:22:55.799380 systemd[1]: Reached target integritysetup.target. Feb 8 23:22:55.799390 systemd[1]: Reached target remote-cryptsetup.target. Feb 8 23:22:55.799403 systemd[1]: Reached target remote-fs.target. Feb 8 23:22:55.799414 systemd[1]: Reached target slices.target. Feb 8 23:22:55.799426 systemd[1]: Reached target swap.target. Feb 8 23:22:55.799437 systemd[1]: Reached target torcx.target. Feb 8 23:22:55.799450 systemd[1]: Reached target veritysetup.target. Feb 8 23:22:55.799463 systemd[1]: Listening on systemd-coredump.socket. Feb 8 23:22:55.799475 systemd[1]: Listening on systemd-initctl.socket. Feb 8 23:22:55.799487 systemd[1]: Listening on systemd-networkd.socket. Feb 8 23:22:55.799500 systemd[1]: Listening on systemd-udevd-control.socket. Feb 8 23:22:55.799513 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 8 23:22:55.799532 systemd[1]: Listening on systemd-userdbd.socket. Feb 8 23:22:55.799546 systemd[1]: Mounting dev-hugepages.mount... Feb 8 23:22:55.799557 systemd[1]: Mounting dev-mqueue.mount... Feb 8 23:22:55.799569 systemd[1]: Mounting media.mount... Feb 8 23:22:55.799581 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 8 23:22:55.799593 systemd[1]: Mounting sys-kernel-debug.mount... Feb 8 23:22:55.799606 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 8 23:22:55.799616 systemd[1]: Mounting tmp.mount... Feb 8 23:22:55.799631 systemd[1]: Starting flatcar-tmpfiles.service... Feb 8 23:22:55.799643 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 8 23:22:55.799655 systemd[1]: Starting kmod-static-nodes.service... Feb 8 23:22:55.799668 systemd[1]: Starting modprobe@configfs.service... Feb 8 23:22:55.799681 systemd[1]: Starting modprobe@dm_mod.service... Feb 8 23:22:55.799694 systemd[1]: Starting modprobe@drm.service... Feb 8 23:22:55.799706 systemd[1]: Starting modprobe@efi_pstore.service... Feb 8 23:22:55.799719 systemd[1]: Starting modprobe@fuse.service... Feb 8 23:22:55.799735 systemd[1]: Starting modprobe@loop.service... Feb 8 23:22:55.799750 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 8 23:22:55.799763 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 8 23:22:55.799778 systemd[1]: Stopped systemd-fsck-root.service. Feb 8 23:22:55.799793 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 8 23:22:55.799815 systemd[1]: Stopped systemd-fsck-usr.service. Feb 8 23:22:55.799831 systemd[1]: Stopped systemd-journald.service. Feb 8 23:22:55.799843 kernel: loop: module loaded Feb 8 23:22:55.799857 systemd[1]: Starting systemd-journald.service... Feb 8 23:22:55.799872 systemd[1]: Starting systemd-modules-load.service... Feb 8 23:22:55.799883 systemd[1]: Starting systemd-network-generator.service... Feb 8 23:22:55.799895 systemd[1]: Starting systemd-remount-fs.service... Feb 8 23:22:55.799907 systemd[1]: Starting systemd-udev-trigger.service... Feb 8 23:22:55.799919 systemd[1]: verity-setup.service: Deactivated successfully. Feb 8 23:22:55.799931 systemd[1]: Stopped verity-setup.service. Feb 8 23:22:55.799945 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 8 23:22:55.799959 systemd[1]: Mounted dev-hugepages.mount. Feb 8 23:22:55.799972 systemd[1]: Mounted dev-mqueue.mount. Feb 8 23:22:55.799987 kernel: fuse: init (API version 7.34) Feb 8 23:22:55.799999 systemd[1]: Mounted media.mount. Feb 8 23:22:55.800012 systemd[1]: Mounted sys-kernel-debug.mount. Feb 8 23:22:55.800027 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 8 23:22:55.800045 systemd-journald[1133]: Journal started Feb 8 23:22:55.800111 systemd-journald[1133]: Runtime Journal (/run/log/journal/c3518078fde747089b8e832db23c281c) is 8.0M, max 159.0M, 151.0M free. Feb 8 23:22:55.800162 systemd[1]: Mounted tmp.mount. Feb 8 23:22:43.960000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 8 23:22:44.668000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 8 23:22:44.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 8 23:22:44.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 8 23:22:44.685000 audit: BPF prog-id=10 op=LOAD Feb 8 23:22:44.685000 audit: BPF prog-id=10 op=UNLOAD Feb 8 23:22:44.685000 audit: BPF prog-id=11 op=LOAD Feb 8 23:22:44.685000 audit: BPF prog-id=11 op=UNLOAD Feb 8 23:22:46.231000 audit[1031]: AVC avc: denied { associate } for pid=1031 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 8 23:22:46.231000 audit[1031]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1014 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.231000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:22:46.238000 audit[1031]: AVC avc: denied { associate } for pid=1031 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 8 23:22:46.238000 audit[1031]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1014 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.238000 audit: CWD cwd="/" Feb 8 23:22:46.238000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:46.238000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:46.238000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:22:55.324000 audit: BPF prog-id=12 op=LOAD Feb 8 23:22:55.324000 audit: BPF prog-id=3 op=UNLOAD Feb 8 23:22:55.334000 audit: BPF prog-id=13 op=LOAD Feb 8 23:22:55.339000 audit: BPF prog-id=14 op=LOAD Feb 8 23:22:55.339000 audit: BPF prog-id=4 op=UNLOAD Feb 8 23:22:55.339000 audit: BPF prog-id=5 op=UNLOAD Feb 8 23:22:55.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.373000 audit: BPF prog-id=12 op=UNLOAD Feb 8 23:22:55.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.712000 audit: BPF prog-id=15 op=LOAD Feb 8 23:22:55.712000 audit: BPF prog-id=16 op=LOAD Feb 8 23:22:55.712000 audit: BPF prog-id=17 op=LOAD Feb 8 23:22:55.712000 audit: BPF prog-id=13 op=UNLOAD Feb 8 23:22:55.712000 audit: BPF prog-id=14 op=UNLOAD Feb 8 23:22:55.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.795000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 8 23:22:55.795000 audit[1133]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe35f8e240 a2=4000 a3=7ffe35f8e2dc items=0 ppid=1 pid=1133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:55.795000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 8 23:22:55.323036 systemd[1]: Queued start job for default target multi-user.target. Feb 8 23:22:46.162255 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:22:55.340641 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 8 23:22:46.178089 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 8 23:22:46.178116 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 8 23:22:46.178155 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 8 23:22:46.178166 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 8 23:22:46.178221 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 8 23:22:46.178237 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 8 23:22:46.178448 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 8 23:22:46.178502 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 8 23:22:46.178518 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 8 23:22:46.194328 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 8 23:22:46.194377 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 8 23:22:46.194404 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 8 23:22:46.194420 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 8 23:22:46.194440 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 8 23:22:46.194461 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 8 23:22:54.059992 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:54Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:22:54.060237 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:54Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:22:54.060360 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:54Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:22:54.060523 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:54Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:22:54.060597 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:54Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 8 23:22:54.060651 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-02-08T23:22:54Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 8 23:22:55.808546 systemd[1]: Started systemd-journald.service. Feb 8 23:22:55.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.809968 systemd[1]: Finished flatcar-tmpfiles.service. Feb 8 23:22:55.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.812037 systemd[1]: Finished kmod-static-nodes.service. Feb 8 23:22:55.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.814029 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 8 23:22:55.814166 systemd[1]: Finished modprobe@configfs.service. Feb 8 23:22:55.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.816167 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 8 23:22:55.816303 systemd[1]: Finished modprobe@dm_mod.service. Feb 8 23:22:55.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.819062 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 8 23:22:55.819307 systemd[1]: Finished modprobe@drm.service. Feb 8 23:22:55.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.821716 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 8 23:22:55.821854 systemd[1]: Finished modprobe@efi_pstore.service. Feb 8 23:22:55.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.824285 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 8 23:22:55.824422 systemd[1]: Finished modprobe@fuse.service. Feb 8 23:22:55.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.826649 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 8 23:22:55.826785 systemd[1]: Finished modprobe@loop.service. Feb 8 23:22:55.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.829045 systemd[1]: Finished systemd-modules-load.service. Feb 8 23:22:55.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.831397 systemd[1]: Finished systemd-network-generator.service. Feb 8 23:22:55.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.833753 systemd[1]: Finished systemd-remount-fs.service. Feb 8 23:22:55.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.836373 systemd[1]: Reached target network-pre.target. Feb 8 23:22:55.839392 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 8 23:22:55.842623 systemd[1]: Mounting sys-kernel-config.mount... Feb 8 23:22:55.844424 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 8 23:22:55.846095 systemd[1]: Starting systemd-hwdb-update.service... Feb 8 23:22:55.849102 systemd[1]: Starting systemd-journal-flush.service... Feb 8 23:22:55.851106 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 8 23:22:55.852073 systemd[1]: Starting systemd-random-seed.service... Feb 8 23:22:55.854064 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 8 23:22:55.855364 systemd[1]: Starting systemd-sysctl.service... Feb 8 23:22:55.859822 systemd[1]: Starting systemd-sysusers.service... Feb 8 23:22:55.866488 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 8 23:22:55.868851 systemd[1]: Mounted sys-kernel-config.mount. Feb 8 23:22:55.904097 systemd-journald[1133]: Time spent on flushing to /var/log/journal/c3518078fde747089b8e832db23c281c is 26.212ms for 1167 entries. Feb 8 23:22:55.904097 systemd-journald[1133]: System Journal (/var/log/journal/c3518078fde747089b8e832db23c281c) is 8.0M, max 2.6G, 2.6G free. Feb 8 23:22:55.983861 systemd-journald[1133]: Received client request to flush runtime journal. Feb 8 23:22:55.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:55.915487 systemd[1]: Finished systemd-udev-trigger.service. Feb 8 23:22:55.984350 udevadm[1155]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 8 23:22:55.919493 systemd[1]: Starting systemd-udev-settle.service... Feb 8 23:22:55.925441 systemd[1]: Finished systemd-random-seed.service. Feb 8 23:22:55.927486 systemd[1]: Reached target first-boot-complete.target. Feb 8 23:22:55.943951 systemd[1]: Finished systemd-sysctl.service. Feb 8 23:22:55.984838 systemd[1]: Finished systemd-journal-flush.service. Feb 8 23:22:55.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:56.347754 systemd[1]: Finished systemd-sysusers.service. Feb 8 23:22:56.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:57.284671 systemd[1]: Finished systemd-hwdb-update.service. Feb 8 23:22:57.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:57.287000 audit: BPF prog-id=18 op=LOAD Feb 8 23:22:57.287000 audit: BPF prog-id=19 op=LOAD Feb 8 23:22:57.287000 audit: BPF prog-id=7 op=UNLOAD Feb 8 23:22:57.287000 audit: BPF prog-id=8 op=UNLOAD Feb 8 23:22:57.288660 systemd[1]: Starting systemd-udevd.service... Feb 8 23:22:57.306466 systemd-udevd[1158]: Using default interface naming scheme 'v252'. Feb 8 23:22:57.620549 systemd[1]: Started systemd-udevd.service. Feb 8 23:22:57.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:57.623000 audit: BPF prog-id=20 op=LOAD Feb 8 23:22:57.625363 systemd[1]: Starting systemd-networkd.service... Feb 8 23:22:57.658071 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 8 23:22:57.754000 audit: BPF prog-id=21 op=LOAD Feb 8 23:22:57.754000 audit: BPF prog-id=22 op=LOAD Feb 8 23:22:57.754000 audit: BPF prog-id=23 op=LOAD Feb 8 23:22:57.755673 systemd[1]: Starting systemd-userdbd.service... Feb 8 23:22:57.761000 audit[1171]: AVC avc: denied { confidentiality } for pid=1171 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 8 23:22:57.777546 kernel: mousedev: PS/2 mouse device common for all mice Feb 8 23:22:57.793566 kernel: hv_vmbus: registering driver hyperv_fb Feb 8 23:22:57.798576 kernel: hv_vmbus: registering driver hv_balloon Feb 8 23:22:57.810495 kernel: hv_utils: Registering HyperV Utility Driver Feb 8 23:22:57.822838 kernel: hv_vmbus: registering driver hv_utils Feb 8 23:22:57.822877 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 8 23:22:57.822903 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 8 23:22:57.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:57.820187 systemd[1]: Started systemd-userdbd.service. Feb 8 23:22:57.828363 kernel: Console: switching to colour dummy device 80x25 Feb 8 23:22:57.828416 kernel: hv_utils: Heartbeat IC version 3.0 Feb 8 23:22:57.829551 kernel: hv_utils: Shutdown IC version 3.2 Feb 8 23:22:58.011167 kernel: hv_utils: TimeSync IC version 4.0 Feb 8 23:22:58.011215 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 8 23:22:58.020853 kernel: Console: switching to colour frame buffer device 128x48 Feb 8 23:22:57.761000 audit[1171]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56125e6e49c0 a1=f884 a2=7f858a7cdbc5 a3=5 items=12 ppid=1158 pid=1171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:57.761000 audit: CWD cwd="/" Feb 8 23:22:57.761000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=1 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=2 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=3 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=4 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=5 name=(null) inode=14023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=6 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=7 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=8 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=9 name=(null) inode=14025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=10 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PATH item=11 name=(null) inode=14026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:57.761000 audit: PROCTITLE proctitle="(udev-worker)" Feb 8 23:22:58.205854 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 8 23:22:58.247853 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1179) Feb 8 23:22:58.267322 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 8 23:22:58.279167 systemd[1]: Finished systemd-udev-settle.service. Feb 8 23:22:58.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:58.282760 systemd[1]: Starting lvm2-activation-early.service... Feb 8 23:22:58.359959 systemd-networkd[1164]: lo: Link UP Feb 8 23:22:58.359970 systemd-networkd[1164]: lo: Gained carrier Feb 8 23:22:58.360998 systemd-networkd[1164]: Enumeration completed Feb 8 23:22:58.361246 systemd[1]: Started systemd-networkd.service. Feb 8 23:22:58.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:58.364739 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 8 23:22:58.392200 systemd-networkd[1164]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:22:58.448870 kernel: mlx5_core fd51:00:02.0 enP64849s1: Link up Feb 8 23:22:58.486851 kernel: hv_netvsc 000d3a66-0651-000d-3a66-0651000d3a66 eth0: Data path switched to VF: enP64849s1 Feb 8 23:22:58.488289 systemd-networkd[1164]: enP64849s1: Link UP Feb 8 23:22:58.488609 systemd-networkd[1164]: eth0: Link UP Feb 8 23:22:58.488723 systemd-networkd[1164]: eth0: Gained carrier Feb 8 23:22:58.492204 systemd-networkd[1164]: enP64849s1: Gained carrier Feb 8 23:22:58.529954 systemd-networkd[1164]: eth0: DHCPv4 address 10.200.8.31/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 8 23:22:58.593426 lvm[1234]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 8 23:22:58.622970 systemd[1]: Finished lvm2-activation-early.service. Feb 8 23:22:58.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:58.625693 systemd[1]: Reached target cryptsetup.target. Feb 8 23:22:58.628974 systemd[1]: Starting lvm2-activation.service... Feb 8 23:22:58.634848 lvm[1237]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 8 23:22:58.659914 systemd[1]: Finished lvm2-activation.service. Feb 8 23:22:58.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:58.662387 systemd[1]: Reached target local-fs-pre.target. Feb 8 23:22:58.664792 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 8 23:22:58.664822 systemd[1]: Reached target local-fs.target. Feb 8 23:22:58.666809 systemd[1]: Reached target machines.target. Feb 8 23:22:58.669659 systemd[1]: Starting ldconfig.service... Feb 8 23:22:58.671739 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 8 23:22:58.671842 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:22:58.672903 systemd[1]: Starting systemd-boot-update.service... Feb 8 23:22:58.675890 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 8 23:22:58.679374 systemd[1]: Starting systemd-machine-id-commit.service... Feb 8 23:22:58.681607 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 8 23:22:58.681686 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 8 23:22:58.682815 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 8 23:22:58.721941 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1239 (bootctl) Feb 8 23:22:58.723311 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 8 23:22:59.672918 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 8 23:22:59.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:59.808496 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 8 23:22:59.809231 systemd[1]: Finished systemd-machine-id-commit.service. Feb 8 23:22:59.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:59.820156 systemd-tmpfiles[1242]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 8 23:22:59.881958 systemd-tmpfiles[1242]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 8 23:22:59.939521 systemd-tmpfiles[1242]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 8 23:23:00.046968 systemd-networkd[1164]: eth0: Gained IPv6LL Feb 8 23:23:00.052636 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 8 23:23:00.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:00.415599 systemd-fsck[1247]: fsck.fat 4.2 (2021-01-31) Feb 8 23:23:00.415599 systemd-fsck[1247]: /dev/sda1: 789 files, 115332/258078 clusters Feb 8 23:23:00.417822 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 8 23:23:00.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:00.423319 systemd[1]: Mounting boot.mount... Feb 8 23:23:00.435470 systemd[1]: Mounted boot.mount. Feb 8 23:23:00.448501 systemd[1]: Finished systemd-boot-update.service. Feb 8 23:23:00.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.024817 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 8 23:23:01.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.029198 systemd[1]: Starting audit-rules.service... Feb 8 23:23:01.030166 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 8 23:23:01.030223 kernel: audit: type=1130 audit(1707434581.027:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.042313 systemd[1]: Starting clean-ca-certificates.service... Feb 8 23:23:01.045399 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 8 23:23:01.047000 audit: BPF prog-id=24 op=LOAD Feb 8 23:23:01.055370 kernel: audit: type=1334 audit(1707434581.047:157): prog-id=24 op=LOAD Feb 8 23:23:01.052997 systemd[1]: Starting systemd-resolved.service... Feb 8 23:23:01.060874 kernel: audit: type=1334 audit(1707434581.054:158): prog-id=25 op=LOAD Feb 8 23:23:01.054000 audit: BPF prog-id=25 op=LOAD Feb 8 23:23:01.059183 systemd[1]: Starting systemd-timesyncd.service... Feb 8 23:23:01.063122 systemd[1]: Starting systemd-update-utmp.service... Feb 8 23:23:01.101896 kernel: audit: type=1127 audit(1707434581.089:159): pid=1261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.089000 audit[1261]: SYSTEM_BOOT pid=1261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.092029 systemd[1]: Finished systemd-update-utmp.service. Feb 8 23:23:01.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.116850 kernel: audit: type=1130 audit(1707434581.102:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.138339 systemd[1]: Finished clean-ca-certificates.service. Feb 8 23:23:01.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.140664 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 8 23:23:01.150937 kernel: audit: type=1130 audit(1707434581.139:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.171337 systemd[1]: Started systemd-timesyncd.service. Feb 8 23:23:01.185717 kernel: audit: type=1130 audit(1707434581.173:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.173607 systemd[1]: Reached target time-set.target. Feb 8 23:23:01.193780 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 8 23:23:01.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.207318 kernel: audit: type=1130 audit(1707434581.196:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:01.289232 systemd-resolved[1257]: Positive Trust Anchors: Feb 8 23:23:01.289247 systemd-resolved[1257]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 8 23:23:01.289285 systemd-resolved[1257]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 8 23:23:01.407000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 8 23:23:01.409138 systemd[1]: Finished audit-rules.service. Feb 8 23:23:01.410097 augenrules[1274]: No rules Feb 8 23:23:01.407000 audit[1274]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf66db8b0 a2=420 a3=0 items=0 ppid=1253 pid=1274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:01.432454 kernel: audit: type=1305 audit(1707434581.407:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 8 23:23:01.432526 kernel: audit: type=1300 audit(1707434581.407:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf66db8b0 a2=420 a3=0 items=0 ppid=1253 pid=1274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:01.407000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 8 23:23:01.433855 systemd-resolved[1257]: Using system hostname 'ci-3510.3.2-a-7d5bfcb083'. Feb 8 23:23:01.435344 systemd[1]: Started systemd-resolved.service. Feb 8 23:23:01.437186 systemd[1]: Reached target network.target. Feb 8 23:23:01.438927 systemd[1]: Reached target network-online.target. Feb 8 23:23:01.440786 systemd[1]: Reached target nss-lookup.target. Feb 8 23:23:01.519363 systemd-timesyncd[1258]: Contacted time server 188.125.64.7:123 (0.flatcar.pool.ntp.org). Feb 8 23:23:01.519459 systemd-timesyncd[1258]: Initial clock synchronization to Thu 2024-02-08 23:23:01.522615 UTC. Feb 8 23:23:07.643401 ldconfig[1238]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 8 23:23:07.659601 systemd[1]: Finished ldconfig.service. Feb 8 23:23:07.663079 systemd[1]: Starting systemd-update-done.service... Feb 8 23:23:07.693081 systemd[1]: Finished systemd-update-done.service. Feb 8 23:23:07.695782 systemd[1]: Reached target sysinit.target. Feb 8 23:23:07.698048 systemd[1]: Started motdgen.path. Feb 8 23:23:07.700047 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 8 23:23:07.703187 systemd[1]: Started logrotate.timer. Feb 8 23:23:07.704893 systemd[1]: Started mdadm.timer. Feb 8 23:23:07.706409 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 8 23:23:07.708269 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 8 23:23:07.708307 systemd[1]: Reached target paths.target. Feb 8 23:23:07.709994 systemd[1]: Reached target timers.target. Feb 8 23:23:07.711933 systemd[1]: Listening on dbus.socket. Feb 8 23:23:07.714479 systemd[1]: Starting docker.socket... Feb 8 23:23:07.718685 systemd[1]: Listening on sshd.socket. Feb 8 23:23:07.720712 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:23:07.721165 systemd[1]: Listening on docker.socket. Feb 8 23:23:07.723072 systemd[1]: Reached target sockets.target. Feb 8 23:23:07.725045 systemd[1]: Reached target basic.target. Feb 8 23:23:07.726977 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 8 23:23:07.727008 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 8 23:23:07.728019 systemd[1]: Starting containerd.service... Feb 8 23:23:07.730918 systemd[1]: Starting dbus.service... Feb 8 23:23:07.733539 systemd[1]: Starting enable-oem-cloudinit.service... Feb 8 23:23:07.736547 systemd[1]: Starting extend-filesystems.service... Feb 8 23:23:07.738449 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 8 23:23:07.739691 systemd[1]: Starting motdgen.service... Feb 8 23:23:07.743409 systemd[1]: Started nvidia.service. Feb 8 23:23:07.746313 systemd[1]: Starting prepare-cni-plugins.service... Feb 8 23:23:07.750308 systemd[1]: Starting prepare-critools.service... Feb 8 23:23:07.753498 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 8 23:23:07.756803 systemd[1]: Starting sshd-keygen.service... Feb 8 23:23:07.761407 systemd[1]: Starting systemd-logind.service... Feb 8 23:23:07.763852 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:23:07.763934 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 8 23:23:07.764448 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 8 23:23:07.766517 systemd[1]: Starting update-engine.service... Feb 8 23:23:07.769522 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 8 23:23:07.778980 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 8 23:23:07.780274 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 8 23:23:07.820860 extend-filesystems[1285]: Found sda Feb 8 23:23:07.820860 extend-filesystems[1285]: Found sda1 Feb 8 23:23:07.820860 extend-filesystems[1285]: Found sda2 Feb 8 23:23:07.820860 extend-filesystems[1285]: Found sda3 Feb 8 23:23:07.820860 extend-filesystems[1285]: Found usr Feb 8 23:23:07.820860 extend-filesystems[1285]: Found sda4 Feb 8 23:23:07.820860 extend-filesystems[1285]: Found sda6 Feb 8 23:23:07.832324 extend-filesystems[1285]: Found sda7 Feb 8 23:23:07.832324 extend-filesystems[1285]: Found sda9 Feb 8 23:23:07.832324 extend-filesystems[1285]: Checking size of /dev/sda9 Feb 8 23:23:07.869694 systemd[1]: motdgen.service: Deactivated successfully. Feb 8 23:23:07.869967 systemd[1]: Finished motdgen.service. Feb 8 23:23:07.891517 jq[1284]: false Feb 8 23:23:07.891809 jq[1299]: true Feb 8 23:23:07.891825 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 8 23:23:07.892053 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 8 23:23:07.910434 tar[1303]: ./ Feb 8 23:23:07.910434 tar[1303]: ./loopback Feb 8 23:23:07.912017 tar[1304]: crictl Feb 8 23:23:07.912956 jq[1318]: true Feb 8 23:23:07.947109 systemd-logind[1296]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 8 23:23:07.952567 systemd-logind[1296]: New seat seat0. Feb 8 23:23:07.964009 tar[1303]: ./bandwidth Feb 8 23:23:07.995475 extend-filesystems[1285]: Old size kept for /dev/sda9 Feb 8 23:23:07.998600 extend-filesystems[1285]: Found sr0 Feb 8 23:23:08.001097 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 8 23:23:08.001296 systemd[1]: Finished extend-filesystems.service. Feb 8 23:23:08.038002 tar[1303]: ./ptp Feb 8 23:23:08.077278 env[1312]: time="2024-02-08T23:23:08.077221164Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 8 23:23:08.097323 systemd[1]: nvidia.service: Deactivated successfully. Feb 8 23:23:08.103474 dbus-daemon[1283]: [system] SELinux support is enabled Feb 8 23:23:08.103638 systemd[1]: Started dbus.service. Feb 8 23:23:08.108193 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 8 23:23:08.108233 systemd[1]: Reached target system-config.target. Feb 8 23:23:08.110693 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 8 23:23:08.110722 systemd[1]: Reached target user-config.target. Feb 8 23:23:08.113846 dbus-daemon[1283]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 8 23:23:08.114351 systemd[1]: Started systemd-logind.service. Feb 8 23:23:08.121848 bash[1338]: Updated "/home/core/.ssh/authorized_keys" Feb 8 23:23:08.122511 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 8 23:23:08.150201 tar[1303]: ./vlan Feb 8 23:23:08.204787 env[1312]: time="2024-02-08T23:23:08.203683646Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 8 23:23:08.204787 env[1312]: time="2024-02-08T23:23:08.203853170Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:23:08.213524 env[1312]: time="2024-02-08T23:23:08.213482747Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:23:08.213524 env[1312]: time="2024-02-08T23:23:08.213522553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:23:08.213825 env[1312]: time="2024-02-08T23:23:08.213791591Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:23:08.213916 env[1312]: time="2024-02-08T23:23:08.213838698Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 8 23:23:08.213916 env[1312]: time="2024-02-08T23:23:08.213859201Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 8 23:23:08.213916 env[1312]: time="2024-02-08T23:23:08.213874003Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 8 23:23:08.214025 env[1312]: time="2024-02-08T23:23:08.213982218Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:23:08.214287 env[1312]: time="2024-02-08T23:23:08.214260758Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:23:08.214479 env[1312]: time="2024-02-08T23:23:08.214448885Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:23:08.214543 env[1312]: time="2024-02-08T23:23:08.214480690Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 8 23:23:08.214584 env[1312]: time="2024-02-08T23:23:08.214548899Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 8 23:23:08.214584 env[1312]: time="2024-02-08T23:23:08.214564702Z" level=info msg="metadata content store policy set" policy=shared Feb 8 23:23:08.229159 env[1312]: time="2024-02-08T23:23:08.229124483Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 8 23:23:08.229249 env[1312]: time="2024-02-08T23:23:08.229164789Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 8 23:23:08.229249 env[1312]: time="2024-02-08T23:23:08.229182192Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 8 23:23:08.229249 env[1312]: time="2024-02-08T23:23:08.229228198Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.229363 env[1312]: time="2024-02-08T23:23:08.229248901Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.229363 env[1312]: time="2024-02-08T23:23:08.229304809Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.229363 env[1312]: time="2024-02-08T23:23:08.229330213Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.229363 env[1312]: time="2024-02-08T23:23:08.229349316Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.229501 env[1312]: time="2024-02-08T23:23:08.229367218Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.229501 env[1312]: time="2024-02-08T23:23:08.229386421Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.229501 env[1312]: time="2024-02-08T23:23:08.229403723Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.229501 env[1312]: time="2024-02-08T23:23:08.229423426Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 8 23:23:08.229637 env[1312]: time="2024-02-08T23:23:08.229551245Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 8 23:23:08.229681 env[1312]: time="2024-02-08T23:23:08.229653559Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230073619Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230112725Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230133728Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230203138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230225241Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230243143Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230315154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230332556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230349359Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230365761Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230383163Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230402166Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230554288Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230574991Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.230862 env[1312]: time="2024-02-08T23:23:08.230592793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.231395 env[1312]: time="2024-02-08T23:23:08.230610196Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 8 23:23:08.231395 env[1312]: time="2024-02-08T23:23:08.230634499Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 8 23:23:08.231395 env[1312]: time="2024-02-08T23:23:08.230651302Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 8 23:23:08.231395 env[1312]: time="2024-02-08T23:23:08.230675705Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 8 23:23:08.231395 env[1312]: time="2024-02-08T23:23:08.230715811Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 8 23:23:08.231579 env[1312]: time="2024-02-08T23:23:08.230996751Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 8 23:23:08.231579 env[1312]: time="2024-02-08T23:23:08.231073762Z" level=info msg="Connect containerd service" Feb 8 23:23:08.231579 env[1312]: time="2024-02-08T23:23:08.231112268Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.232601181Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.232714397Z" level=info msg="Start subscribing containerd event" Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.232759903Z" level=info msg="Start recovering state" Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.232825613Z" level=info msg="Start event monitor" Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.232853217Z" level=info msg="Start snapshots syncer" Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.232865118Z" level=info msg="Start cni network conf syncer for default" Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.232877420Z" level=info msg="Start streaming server" Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.233243672Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 8 23:23:08.267685 env[1312]: time="2024-02-08T23:23:08.233298280Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 8 23:23:08.268015 tar[1303]: ./host-device Feb 8 23:23:08.233452 systemd[1]: Started containerd.service. Feb 8 23:23:08.286387 env[1312]: time="2024-02-08T23:23:08.286353066Z" level=info msg="containerd successfully booted in 0.229719s" Feb 8 23:23:08.309277 tar[1303]: ./tuning Feb 8 23:23:08.349932 tar[1303]: ./vrf Feb 8 23:23:08.390111 tar[1303]: ./sbr Feb 8 23:23:08.430895 tar[1303]: ./tap Feb 8 23:23:08.479069 tar[1303]: ./dhcp Feb 8 23:23:08.600709 tar[1303]: ./static Feb 8 23:23:08.636873 tar[1303]: ./firewall Feb 8 23:23:08.720217 tar[1303]: ./macvlan Feb 8 23:23:08.749459 update_engine[1297]: I0208 23:23:08.748977 1297 main.cc:92] Flatcar Update Engine starting Feb 8 23:23:08.781279 tar[1303]: ./dummy Feb 8 23:23:08.811788 systemd[1]: Started update-engine.service. Feb 8 23:23:08.814455 update_engine[1297]: I0208 23:23:08.813333 1297 update_check_scheduler.cc:74] Next update check in 4m26s Feb 8 23:23:08.816925 systemd[1]: Started locksmithd.service. Feb 8 23:23:08.879439 tar[1303]: ./bridge Feb 8 23:23:08.935984 systemd[1]: Finished prepare-critools.service. Feb 8 23:23:08.961944 tar[1303]: ./ipvlan Feb 8 23:23:09.006114 tar[1303]: ./portmap Feb 8 23:23:09.047798 tar[1303]: ./host-local Feb 8 23:23:09.139936 systemd[1]: Finished prepare-cni-plugins.service. Feb 8 23:23:09.459791 sshd_keygen[1305]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 8 23:23:09.479583 systemd[1]: Finished sshd-keygen.service. Feb 8 23:23:09.483735 systemd[1]: Starting issuegen.service... Feb 8 23:23:09.487409 systemd[1]: Started waagent.service. Feb 8 23:23:09.491755 systemd[1]: issuegen.service: Deactivated successfully. Feb 8 23:23:09.491919 systemd[1]: Finished issuegen.service. Feb 8 23:23:09.495033 systemd[1]: Starting systemd-user-sessions.service... Feb 8 23:23:09.502160 systemd[1]: Finished systemd-user-sessions.service. Feb 8 23:23:09.506288 systemd[1]: Started getty@tty1.service. Feb 8 23:23:09.509183 systemd[1]: Started serial-getty@ttyS0.service. Feb 8 23:23:09.511575 systemd[1]: Reached target getty.target. Feb 8 23:23:09.513379 systemd[1]: Reached target multi-user.target. Feb 8 23:23:09.516564 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 8 23:23:09.525662 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 8 23:23:09.525789 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 8 23:23:09.528154 systemd[1]: Startup finished in 954ms (firmware) + 31.106s (loader) + 862ms (kernel) + 15.675s (initrd) + 25.967s (userspace) = 1min 14.565s. Feb 8 23:23:10.045863 login[1407]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 8 23:23:10.046005 login[1406]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 8 23:23:10.099565 systemd[1]: Created slice user-500.slice. Feb 8 23:23:10.101130 systemd[1]: Starting user-runtime-dir@500.service... Feb 8 23:23:10.103870 systemd-logind[1296]: New session 2 of user core. Feb 8 23:23:10.109251 systemd-logind[1296]: New session 1 of user core. Feb 8 23:23:10.113309 systemd[1]: Finished user-runtime-dir@500.service. Feb 8 23:23:10.114894 systemd[1]: Starting user@500.service... Feb 8 23:23:10.118152 (systemd)[1410]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:23:10.305998 systemd[1410]: Queued start job for default target default.target. Feb 8 23:23:10.306562 systemd[1410]: Reached target paths.target. Feb 8 23:23:10.306591 systemd[1410]: Reached target sockets.target. Feb 8 23:23:10.306607 systemd[1410]: Reached target timers.target. Feb 8 23:23:10.306621 systemd[1410]: Reached target basic.target. Feb 8 23:23:10.306735 systemd[1]: Started user@500.service. Feb 8 23:23:10.307909 systemd[1]: Started session-1.scope. Feb 8 23:23:10.308702 systemd[1]: Started session-2.scope. Feb 8 23:23:10.309595 systemd[1410]: Reached target default.target. Feb 8 23:23:10.309794 systemd[1410]: Startup finished in 186ms. Feb 8 23:23:10.438912 locksmithd[1385]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 8 23:23:16.860615 waagent[1401]: 2024-02-08T23:23:16.860510Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 8 23:23:16.864225 waagent[1401]: 2024-02-08T23:23:16.864147Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 8 23:23:16.866654 waagent[1401]: 2024-02-08T23:23:16.866586Z INFO Daemon Daemon Python: 3.9.16 Feb 8 23:23:16.869047 waagent[1401]: 2024-02-08T23:23:16.868973Z INFO Daemon Daemon Run daemon Feb 8 23:23:16.871375 waagent[1401]: 2024-02-08T23:23:16.871313Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 8 23:23:16.884113 waagent[1401]: 2024-02-08T23:23:16.883994Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 8 23:23:16.890456 waagent[1401]: 2024-02-08T23:23:16.890349Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.890735Z INFO Daemon Daemon cloud-init is enabled: False Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.891449Z INFO Daemon Daemon Using waagent for provisioning Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.892732Z INFO Daemon Daemon Activate resource disk Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.893392Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.901046Z INFO Daemon Daemon Found device: None Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.901958Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.902698Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.904294Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.905432Z INFO Daemon Daemon Running default provisioning handler Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.914435Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.916990Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.917913Z INFO Daemon Daemon cloud-init is enabled: False Feb 8 23:23:16.928052 waagent[1401]: 2024-02-08T23:23:16.918644Z INFO Daemon Daemon Copying ovf-env.xml Feb 8 23:23:17.023437 waagent[1401]: 2024-02-08T23:23:17.023288Z INFO Daemon Daemon Successfully mounted dvd Feb 8 23:23:17.144946 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 8 23:23:17.150036 waagent[1401]: 2024-02-08T23:23:17.149914Z INFO Daemon Daemon Detect protocol endpoint Feb 8 23:23:17.163364 waagent[1401]: 2024-02-08T23:23:17.150370Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 8 23:23:17.163364 waagent[1401]: 2024-02-08T23:23:17.151377Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 8 23:23:17.163364 waagent[1401]: 2024-02-08T23:23:17.152073Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 8 23:23:17.163364 waagent[1401]: 2024-02-08T23:23:17.153031Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 8 23:23:17.163364 waagent[1401]: 2024-02-08T23:23:17.153587Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 8 23:23:17.267384 waagent[1401]: 2024-02-08T23:23:17.267312Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 8 23:23:17.271470 waagent[1401]: 2024-02-08T23:23:17.271421Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 8 23:23:17.274067 waagent[1401]: 2024-02-08T23:23:17.274007Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 8 23:23:17.550039 waagent[1401]: 2024-02-08T23:23:17.549811Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 8 23:23:17.563756 waagent[1401]: 2024-02-08T23:23:17.563677Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 8 23:23:17.566772 waagent[1401]: 2024-02-08T23:23:17.566703Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 8 23:23:17.651817 waagent[1401]: 2024-02-08T23:23:17.651695Z INFO Daemon Daemon Found private key matching thumbprint 95D7124864FFE88011A694D8C945CD5EB4DA076A Feb 8 23:23:17.656374 waagent[1401]: 2024-02-08T23:23:17.656304Z INFO Daemon Daemon Certificate with thumbprint AFED265B010708FD46873EA8D0DCD7198822B3A4 has no matching private key. Feb 8 23:23:17.661039 waagent[1401]: 2024-02-08T23:23:17.660978Z INFO Daemon Daemon Fetch goal state completed Feb 8 23:23:17.686800 waagent[1401]: 2024-02-08T23:23:17.686737Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 56ad4c15-9707-44ba-8ede-24f8f9e73754 New eTag: 2952742884668021588] Feb 8 23:23:17.691759 waagent[1401]: 2024-02-08T23:23:17.691696Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 8 23:23:17.703813 waagent[1401]: 2024-02-08T23:23:17.703751Z INFO Daemon Daemon Starting provisioning Feb 8 23:23:17.706241 waagent[1401]: 2024-02-08T23:23:17.706180Z INFO Daemon Daemon Handle ovf-env.xml. Feb 8 23:23:17.708540 waagent[1401]: 2024-02-08T23:23:17.708481Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-7d5bfcb083] Feb 8 23:23:17.735282 waagent[1401]: 2024-02-08T23:23:17.735148Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-7d5bfcb083] Feb 8 23:23:17.739341 waagent[1401]: 2024-02-08T23:23:17.739257Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 8 23:23:17.743839 waagent[1401]: 2024-02-08T23:23:17.743766Z INFO Daemon Daemon Primary interface is [eth0] Feb 8 23:23:17.757952 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 8 23:23:17.758198 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 8 23:23:17.758267 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 8 23:23:17.758545 systemd[1]: Stopping systemd-networkd.service... Feb 8 23:23:17.763877 systemd-networkd[1164]: eth0: DHCPv6 lease lost Feb 8 23:23:17.765160 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 8 23:23:17.765317 systemd[1]: Stopped systemd-networkd.service. Feb 8 23:23:17.767595 systemd[1]: Starting systemd-networkd.service... Feb 8 23:23:17.797911 systemd-networkd[1454]: enP64849s1: Link UP Feb 8 23:23:17.797920 systemd-networkd[1454]: enP64849s1: Gained carrier Feb 8 23:23:17.799210 systemd-networkd[1454]: eth0: Link UP Feb 8 23:23:17.799218 systemd-networkd[1454]: eth0: Gained carrier Feb 8 23:23:17.799638 systemd-networkd[1454]: lo: Link UP Feb 8 23:23:17.799647 systemd-networkd[1454]: lo: Gained carrier Feb 8 23:23:17.799972 systemd-networkd[1454]: eth0: Gained IPv6LL Feb 8 23:23:17.800237 systemd-networkd[1454]: Enumeration completed Feb 8 23:23:17.800331 systemd[1]: Started systemd-networkd.service. Feb 8 23:23:17.802473 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 8 23:23:17.805807 waagent[1401]: 2024-02-08T23:23:17.802936Z INFO Daemon Daemon Create user account if not exists Feb 8 23:23:17.808883 waagent[1401]: 2024-02-08T23:23:17.807420Z INFO Daemon Daemon User core already exists, skip useradd Feb 8 23:23:17.809284 systemd-networkd[1454]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:23:17.810748 waagent[1401]: 2024-02-08T23:23:17.810675Z INFO Daemon Daemon Configure sudoer Feb 8 23:23:17.813611 waagent[1401]: 2024-02-08T23:23:17.813553Z INFO Daemon Daemon Configure sshd Feb 8 23:23:17.815820 waagent[1401]: 2024-02-08T23:23:17.815759Z INFO Daemon Daemon Deploy ssh public key. Feb 8 23:23:17.856970 systemd-networkd[1454]: eth0: DHCPv4 address 10.200.8.31/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 8 23:23:17.860620 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 8 23:23:19.066664 waagent[1401]: 2024-02-08T23:23:19.066569Z INFO Daemon Daemon Provisioning complete Feb 8 23:23:19.083215 waagent[1401]: 2024-02-08T23:23:19.083131Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 8 23:23:19.086421 waagent[1401]: 2024-02-08T23:23:19.086348Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 8 23:23:19.091699 waagent[1401]: 2024-02-08T23:23:19.091629Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 8 23:23:19.353115 waagent[1463]: 2024-02-08T23:23:19.352950Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 8 23:23:19.353806 waagent[1463]: 2024-02-08T23:23:19.353739Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:23:19.353967 waagent[1463]: 2024-02-08T23:23:19.353912Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:23:19.364886 waagent[1463]: 2024-02-08T23:23:19.364804Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 8 23:23:19.365046 waagent[1463]: 2024-02-08T23:23:19.364993Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 8 23:23:19.425718 waagent[1463]: 2024-02-08T23:23:19.425590Z INFO ExtHandler ExtHandler Found private key matching thumbprint 95D7124864FFE88011A694D8C945CD5EB4DA076A Feb 8 23:23:19.425964 waagent[1463]: 2024-02-08T23:23:19.425899Z INFO ExtHandler ExtHandler Certificate with thumbprint AFED265B010708FD46873EA8D0DCD7198822B3A4 has no matching private key. Feb 8 23:23:19.426204 waagent[1463]: 2024-02-08T23:23:19.426152Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 8 23:23:19.441715 waagent[1463]: 2024-02-08T23:23:19.441652Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 2a035b4e-041b-475f-88d1-4560ba7d166c New eTag: 2952742884668021588] Feb 8 23:23:19.442292 waagent[1463]: 2024-02-08T23:23:19.442233Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 8 23:23:19.524863 waagent[1463]: 2024-02-08T23:23:19.524694Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 8 23:23:19.549892 waagent[1463]: 2024-02-08T23:23:19.549766Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1463 Feb 8 23:23:19.553255 waagent[1463]: 2024-02-08T23:23:19.553188Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 8 23:23:19.554480 waagent[1463]: 2024-02-08T23:23:19.554419Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 8 23:23:19.631602 waagent[1463]: 2024-02-08T23:23:19.631465Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 8 23:23:19.632048 waagent[1463]: 2024-02-08T23:23:19.631965Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 8 23:23:19.639773 waagent[1463]: 2024-02-08T23:23:19.639717Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 8 23:23:19.640235 waagent[1463]: 2024-02-08T23:23:19.640178Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 8 23:23:19.641280 waagent[1463]: 2024-02-08T23:23:19.641215Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 8 23:23:19.642536 waagent[1463]: 2024-02-08T23:23:19.642479Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 8 23:23:19.643136 waagent[1463]: 2024-02-08T23:23:19.643079Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 8 23:23:19.643660 waagent[1463]: 2024-02-08T23:23:19.643606Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:23:19.643760 waagent[1463]: 2024-02-08T23:23:19.643698Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:23:19.644195 waagent[1463]: 2024-02-08T23:23:19.644135Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 8 23:23:19.644394 waagent[1463]: 2024-02-08T23:23:19.644330Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 8 23:23:19.644499 waagent[1463]: 2024-02-08T23:23:19.644445Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:23:19.644857 waagent[1463]: 2024-02-08T23:23:19.644794Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:23:19.645396 waagent[1463]: 2024-02-08T23:23:19.645342Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 8 23:23:19.645984 waagent[1463]: 2024-02-08T23:23:19.645928Z INFO EnvHandler ExtHandler Configure routes Feb 8 23:23:19.646863 waagent[1463]: 2024-02-08T23:23:19.646785Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 8 23:23:19.647009 waagent[1463]: 2024-02-08T23:23:19.646956Z INFO EnvHandler ExtHandler Gateway:None Feb 8 23:23:19.647365 waagent[1463]: 2024-02-08T23:23:19.647312Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 8 23:23:19.647510 waagent[1463]: 2024-02-08T23:23:19.647466Z INFO EnvHandler ExtHandler Routes:None Feb 8 23:23:19.647689 waagent[1463]: 2024-02-08T23:23:19.647640Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 8 23:23:19.647689 waagent[1463]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 8 23:23:19.647689 waagent[1463]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 8 23:23:19.647689 waagent[1463]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 8 23:23:19.647689 waagent[1463]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:23:19.647689 waagent[1463]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:23:19.647689 waagent[1463]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:23:19.651517 waagent[1463]: 2024-02-08T23:23:19.651315Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 8 23:23:19.663355 waagent[1463]: 2024-02-08T23:23:19.663302Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 8 23:23:19.664153 waagent[1463]: 2024-02-08T23:23:19.664100Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 8 23:23:19.665333 waagent[1463]: 2024-02-08T23:23:19.665273Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 8 23:23:19.696911 waagent[1463]: 2024-02-08T23:23:19.696783Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1454' Feb 8 23:23:19.714244 waagent[1463]: 2024-02-08T23:23:19.714175Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 8 23:23:19.816050 waagent[1463]: 2024-02-08T23:23:19.815959Z INFO MonitorHandler ExtHandler Network interfaces: Feb 8 23:23:19.816050 waagent[1463]: Executing ['ip', '-a', '-o', 'link']: Feb 8 23:23:19.816050 waagent[1463]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 8 23:23:19.816050 waagent[1463]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:66:06:51 brd ff:ff:ff:ff:ff:ff Feb 8 23:23:19.816050 waagent[1463]: 3: enP64849s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:66:06:51 brd ff:ff:ff:ff:ff:ff\ altname enP64849p0s2 Feb 8 23:23:19.816050 waagent[1463]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 8 23:23:19.816050 waagent[1463]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 8 23:23:19.816050 waagent[1463]: 2: eth0 inet 10.200.8.31/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 8 23:23:19.816050 waagent[1463]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 8 23:23:19.816050 waagent[1463]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 8 23:23:19.816050 waagent[1463]: 2: eth0 inet6 fe80::20d:3aff:fe66:651/64 scope link \ valid_lft forever preferred_lft forever Feb 8 23:23:19.998698 waagent[1463]: 2024-02-08T23:23:19.998627Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 8 23:23:20.095089 waagent[1401]: 2024-02-08T23:23:20.094934Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 8 23:23:20.101339 waagent[1401]: 2024-02-08T23:23:20.101263Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 8 23:23:21.134261 waagent[1494]: 2024-02-08T23:23:21.134146Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 8 23:23:21.134965 waagent[1494]: 2024-02-08T23:23:21.134894Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 8 23:23:21.135119 waagent[1494]: 2024-02-08T23:23:21.135063Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 8 23:23:21.144394 waagent[1494]: 2024-02-08T23:23:21.144295Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 8 23:23:21.144756 waagent[1494]: 2024-02-08T23:23:21.144700Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:23:21.144940 waagent[1494]: 2024-02-08T23:23:21.144888Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:23:21.156941 waagent[1494]: 2024-02-08T23:23:21.156868Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 8 23:23:21.166729 waagent[1494]: 2024-02-08T23:23:21.166666Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 8 23:23:21.167613 waagent[1494]: 2024-02-08T23:23:21.167553Z INFO ExtHandler Feb 8 23:23:21.167759 waagent[1494]: 2024-02-08T23:23:21.167709Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 8bd33d5b-a304-4a58-a5f2-e27cc89dc44f eTag: 2952742884668021588 source: Fabric] Feb 8 23:23:21.168454 waagent[1494]: 2024-02-08T23:23:21.168396Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 8 23:23:21.169524 waagent[1494]: 2024-02-08T23:23:21.169461Z INFO ExtHandler Feb 8 23:23:21.169657 waagent[1494]: 2024-02-08T23:23:21.169604Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 8 23:23:21.176361 waagent[1494]: 2024-02-08T23:23:21.176309Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 8 23:23:21.176786 waagent[1494]: 2024-02-08T23:23:21.176737Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 8 23:23:21.197709 waagent[1494]: 2024-02-08T23:23:21.197650Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 8 23:23:21.261659 waagent[1494]: 2024-02-08T23:23:21.261531Z INFO ExtHandler Downloaded certificate {'thumbprint': 'AFED265B010708FD46873EA8D0DCD7198822B3A4', 'hasPrivateKey': False} Feb 8 23:23:21.262608 waagent[1494]: 2024-02-08T23:23:21.262544Z INFO ExtHandler Downloaded certificate {'thumbprint': '95D7124864FFE88011A694D8C945CD5EB4DA076A', 'hasPrivateKey': True} Feb 8 23:23:21.263558 waagent[1494]: 2024-02-08T23:23:21.263496Z INFO ExtHandler Fetch goal state completed Feb 8 23:23:21.285666 waagent[1494]: 2024-02-08T23:23:21.285595Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1494 Feb 8 23:23:21.288856 waagent[1494]: 2024-02-08T23:23:21.288786Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 8 23:23:21.290302 waagent[1494]: 2024-02-08T23:23:21.290245Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 8 23:23:21.294934 waagent[1494]: 2024-02-08T23:23:21.294877Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 8 23:23:21.295279 waagent[1494]: 2024-02-08T23:23:21.295222Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 8 23:23:21.302847 waagent[1494]: 2024-02-08T23:23:21.302773Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 8 23:23:21.303286 waagent[1494]: 2024-02-08T23:23:21.303227Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 8 23:23:21.308908 waagent[1494]: 2024-02-08T23:23:21.308796Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 8 23:23:21.313454 waagent[1494]: 2024-02-08T23:23:21.313396Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 8 23:23:21.314784 waagent[1494]: 2024-02-08T23:23:21.314723Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 8 23:23:21.315105 waagent[1494]: 2024-02-08T23:23:21.315048Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:23:21.315587 waagent[1494]: 2024-02-08T23:23:21.315531Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:23:21.316139 waagent[1494]: 2024-02-08T23:23:21.316077Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 8 23:23:21.316549 waagent[1494]: 2024-02-08T23:23:21.316493Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 8 23:23:21.317204 waagent[1494]: 2024-02-08T23:23:21.317152Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:23:21.317456 waagent[1494]: 2024-02-08T23:23:21.317399Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 8 23:23:21.317456 waagent[1494]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 8 23:23:21.317456 waagent[1494]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 8 23:23:21.317456 waagent[1494]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 8 23:23:21.317456 waagent[1494]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:23:21.317456 waagent[1494]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:23:21.317456 waagent[1494]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:23:21.318036 waagent[1494]: 2024-02-08T23:23:21.317978Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 8 23:23:21.318160 waagent[1494]: 2024-02-08T23:23:21.318084Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:23:21.318627 waagent[1494]: 2024-02-08T23:23:21.318572Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 8 23:23:21.322075 waagent[1494]: 2024-02-08T23:23:21.321799Z INFO EnvHandler ExtHandler Configure routes Feb 8 23:23:21.322535 waagent[1494]: 2024-02-08T23:23:21.322479Z INFO EnvHandler ExtHandler Gateway:None Feb 8 23:23:21.323181 waagent[1494]: 2024-02-08T23:23:21.323118Z INFO EnvHandler ExtHandler Routes:None Feb 8 23:23:21.324285 waagent[1494]: 2024-02-08T23:23:21.324225Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 8 23:23:21.324854 waagent[1494]: 2024-02-08T23:23:21.324782Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 8 23:23:21.327448 waagent[1494]: 2024-02-08T23:23:21.327178Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 8 23:23:21.349709 waagent[1494]: 2024-02-08T23:23:21.349617Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 8 23:23:21.352946 waagent[1494]: 2024-02-08T23:23:21.352890Z INFO ExtHandler ExtHandler Downloading manifest Feb 8 23:23:21.357034 waagent[1494]: 2024-02-08T23:23:21.356980Z INFO MonitorHandler ExtHandler Network interfaces: Feb 8 23:23:21.357034 waagent[1494]: Executing ['ip', '-a', '-o', 'link']: Feb 8 23:23:21.357034 waagent[1494]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 8 23:23:21.357034 waagent[1494]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:66:06:51 brd ff:ff:ff:ff:ff:ff Feb 8 23:23:21.357034 waagent[1494]: 3: enP64849s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:66:06:51 brd ff:ff:ff:ff:ff:ff\ altname enP64849p0s2 Feb 8 23:23:21.357034 waagent[1494]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 8 23:23:21.357034 waagent[1494]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 8 23:23:21.357034 waagent[1494]: 2: eth0 inet 10.200.8.31/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 8 23:23:21.357034 waagent[1494]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 8 23:23:21.357034 waagent[1494]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 8 23:23:21.357034 waagent[1494]: 2: eth0 inet6 fe80::20d:3aff:fe66:651/64 scope link \ valid_lft forever preferred_lft forever Feb 8 23:23:21.401134 waagent[1494]: 2024-02-08T23:23:21.401083Z INFO ExtHandler ExtHandler Feb 8 23:23:21.401429 waagent[1494]: 2024-02-08T23:23:21.401374Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 2e064ee2-c451-473e-8be6-914719e2b763 correlation c7c5ec5a-e3e0-4315-b56e-ea19caa09c64 created: 2024-02-08T23:21:44.442909Z] Feb 8 23:23:21.402366 waagent[1494]: 2024-02-08T23:23:21.402304Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 8 23:23:21.408438 waagent[1494]: 2024-02-08T23:23:21.408315Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 7 ms] Feb 8 23:23:21.438073 waagent[1494]: 2024-02-08T23:23:21.438005Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 8 23:23:21.453098 waagent[1494]: 2024-02-08T23:23:21.452846Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 8AB1A922-45C5-46A1-BC5E-B68EF13C66C3;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 8 23:23:21.510514 waagent[1494]: 2024-02-08T23:23:21.510409Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 8 23:23:21.510514 waagent[1494]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:23:21.510514 waagent[1494]: pkts bytes target prot opt in out source destination Feb 8 23:23:21.510514 waagent[1494]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:23:21.510514 waagent[1494]: pkts bytes target prot opt in out source destination Feb 8 23:23:21.510514 waagent[1494]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:23:21.510514 waagent[1494]: pkts bytes target prot opt in out source destination Feb 8 23:23:21.510514 waagent[1494]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 8 23:23:21.510514 waagent[1494]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 8 23:23:21.510514 waagent[1494]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 8 23:23:21.517434 waagent[1494]: 2024-02-08T23:23:21.517335Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 8 23:23:21.517434 waagent[1494]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:23:21.517434 waagent[1494]: pkts bytes target prot opt in out source destination Feb 8 23:23:21.517434 waagent[1494]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:23:21.517434 waagent[1494]: pkts bytes target prot opt in out source destination Feb 8 23:23:21.517434 waagent[1494]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:23:21.517434 waagent[1494]: pkts bytes target prot opt in out source destination Feb 8 23:23:21.517434 waagent[1494]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 8 23:23:21.517434 waagent[1494]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 8 23:23:21.517434 waagent[1494]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 8 23:23:21.517987 waagent[1494]: 2024-02-08T23:23:21.517933Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 8 23:23:46.107973 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 8 23:23:51.654099 systemd[1]: Created slice system-sshd.slice. Feb 8 23:23:51.655674 systemd[1]: Started sshd@0-10.200.8.31:22-10.200.12.6:46620.service. Feb 8 23:23:52.516187 sshd[1542]: Accepted publickey for core from 10.200.12.6 port 46620 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:23:52.517811 sshd[1542]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:23:52.521882 systemd-logind[1296]: New session 3 of user core. Feb 8 23:23:52.522907 systemd[1]: Started session-3.scope. Feb 8 23:23:53.054642 systemd[1]: Started sshd@1-10.200.8.31:22-10.200.12.6:46626.service. Feb 8 23:23:53.684134 sshd[1547]: Accepted publickey for core from 10.200.12.6 port 46626 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:23:53.685792 sshd[1547]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:23:53.690417 systemd[1]: Started session-4.scope. Feb 8 23:23:53.690882 systemd-logind[1296]: New session 4 of user core. Feb 8 23:23:54.025640 update_engine[1297]: I0208 23:23:54.024868 1297 update_attempter.cc:509] Updating boot flags... Feb 8 23:23:54.138654 sshd[1547]: pam_unix(sshd:session): session closed for user core Feb 8 23:23:54.145476 systemd[1]: sshd@1-10.200.8.31:22-10.200.12.6:46626.service: Deactivated successfully. Feb 8 23:23:54.146385 systemd[1]: session-4.scope: Deactivated successfully. Feb 8 23:23:54.147508 systemd-logind[1296]: Session 4 logged out. Waiting for processes to exit. Feb 8 23:23:54.148350 systemd-logind[1296]: Removed session 4. Feb 8 23:23:54.240483 systemd[1]: Started sshd@2-10.200.8.31:22-10.200.12.6:46628.service. Feb 8 23:23:54.868998 sshd[1619]: Accepted publickey for core from 10.200.12.6 port 46628 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:23:54.870580 sshd[1619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:23:54.876188 systemd[1]: Started session-5.scope. Feb 8 23:23:54.876619 systemd-logind[1296]: New session 5 of user core. Feb 8 23:23:55.304663 sshd[1619]: pam_unix(sshd:session): session closed for user core Feb 8 23:23:55.307988 systemd[1]: sshd@2-10.200.8.31:22-10.200.12.6:46628.service: Deactivated successfully. Feb 8 23:23:55.308970 systemd[1]: session-5.scope: Deactivated successfully. Feb 8 23:23:55.309732 systemd-logind[1296]: Session 5 logged out. Waiting for processes to exit. Feb 8 23:23:55.310645 systemd-logind[1296]: Removed session 5. Feb 8 23:23:55.408171 systemd[1]: Started sshd@3-10.200.8.31:22-10.200.12.6:46632.service. Feb 8 23:23:56.021044 sshd[1625]: Accepted publickey for core from 10.200.12.6 port 46632 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:23:56.022651 sshd[1625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:23:56.027653 systemd[1]: Started session-6.scope. Feb 8 23:23:56.028249 systemd-logind[1296]: New session 6 of user core. Feb 8 23:23:56.458232 sshd[1625]: pam_unix(sshd:session): session closed for user core Feb 8 23:23:56.461160 systemd[1]: sshd@3-10.200.8.31:22-10.200.12.6:46632.service: Deactivated successfully. Feb 8 23:23:56.462135 systemd[1]: session-6.scope: Deactivated successfully. Feb 8 23:23:56.462919 systemd-logind[1296]: Session 6 logged out. Waiting for processes to exit. Feb 8 23:23:56.463796 systemd-logind[1296]: Removed session 6. Feb 8 23:23:56.564006 systemd[1]: Started sshd@4-10.200.8.31:22-10.200.12.6:46638.service. Feb 8 23:23:57.185185 sshd[1631]: Accepted publickey for core from 10.200.12.6 port 46638 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:23:57.186727 sshd[1631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:23:57.192365 systemd[1]: Started session-7.scope. Feb 8 23:23:57.192967 systemd-logind[1296]: New session 7 of user core. Feb 8 23:23:57.798570 sudo[1634]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 8 23:23:57.798922 sudo[1634]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:23:57.807213 dbus-daemon[1283]: \xd0}\xa7*\x9cU: received setenforce notice (enforcing=-434303296) Feb 8 23:23:57.808947 sudo[1634]: pam_unix(sudo:session): session closed for user root Feb 8 23:23:57.924733 sshd[1631]: pam_unix(sshd:session): session closed for user core Feb 8 23:23:57.928370 systemd[1]: sshd@4-10.200.8.31:22-10.200.12.6:46638.service: Deactivated successfully. Feb 8 23:23:57.929449 systemd[1]: session-7.scope: Deactivated successfully. Feb 8 23:23:57.930164 systemd-logind[1296]: Session 7 logged out. Waiting for processes to exit. Feb 8 23:23:57.930972 systemd-logind[1296]: Removed session 7. Feb 8 23:23:58.027785 systemd[1]: Started sshd@5-10.200.8.31:22-10.200.12.6:59180.service. Feb 8 23:23:58.642303 sshd[1641]: Accepted publickey for core from 10.200.12.6 port 59180 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:23:58.643908 sshd[1641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:23:58.648468 systemd[1]: Started session-8.scope. Feb 8 23:23:58.649059 systemd-logind[1296]: New session 8 of user core. Feb 8 23:23:59.026511 sudo[1645]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 8 23:23:59.026869 sudo[1645]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:23:59.030311 sudo[1645]: pam_unix(sudo:session): session closed for user root Feb 8 23:23:59.034690 sudo[1644]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 8 23:23:59.034957 sudo[1644]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:23:59.043381 systemd[1]: Stopping audit-rules.service... Feb 8 23:23:59.043000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 8 23:23:59.047682 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 8 23:23:59.047748 kernel: audit: type=1305 audit(1707434639.043:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 8 23:23:59.047982 auditctl[1648]: No rules Feb 8 23:23:59.048396 systemd[1]: audit-rules.service: Deactivated successfully. Feb 8 23:23:59.048544 systemd[1]: Stopped audit-rules.service. Feb 8 23:23:59.049984 systemd[1]: Starting audit-rules.service... Feb 8 23:23:59.043000 audit[1648]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda0788690 a2=420 a3=0 items=0 ppid=1 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:59.067390 kernel: audit: type=1300 audit(1707434639.043:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda0788690 a2=420 a3=0 items=0 ppid=1 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:59.067460 kernel: audit: type=1327 audit(1707434639.043:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 8 23:23:59.043000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 8 23:23:59.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.072120 augenrules[1665]: No rules Feb 8 23:23:59.072817 systemd[1]: Finished audit-rules.service. Feb 8 23:23:59.074808 sudo[1644]: pam_unix(sudo:session): session closed for user root Feb 8 23:23:59.081206 kernel: audit: type=1131 audit(1707434639.047:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.081264 kernel: audit: type=1130 audit(1707434639.071:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.071000 audit[1644]: USER_END pid=1644 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.090850 kernel: audit: type=1106 audit(1707434639.071:168): pid=1644 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.071000 audit[1644]: CRED_DISP pid=1644 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.101843 kernel: audit: type=1104 audit(1707434639.071:169): pid=1644 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.173481 sshd[1641]: pam_unix(sshd:session): session closed for user core Feb 8 23:23:59.174000 audit[1641]: USER_END pid=1641 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:23:59.177059 systemd[1]: sshd@5-10.200.8.31:22-10.200.12.6:59180.service: Deactivated successfully. Feb 8 23:23:59.177864 systemd[1]: session-8.scope: Deactivated successfully. Feb 8 23:23:59.179226 systemd-logind[1296]: Session 8 logged out. Waiting for processes to exit. Feb 8 23:23:59.180258 systemd-logind[1296]: Removed session 8. Feb 8 23:23:59.174000 audit[1641]: CRED_DISP pid=1641 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:23:59.201477 kernel: audit: type=1106 audit(1707434639.174:170): pid=1641 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:23:59.201534 kernel: audit: type=1104 audit(1707434639.174:171): pid=1641 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:23:59.201561 kernel: audit: type=1131 audit(1707434639.174:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.31:22-10.200.12.6:59180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.31:22-10.200.12.6:59180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.278509 systemd[1]: Started sshd@6-10.200.8.31:22-10.200.12.6:59196.service. Feb 8 23:23:59.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.31:22-10.200.12.6:59196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:23:59.893000 audit[1671]: USER_ACCT pid=1671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:23:59.894761 sshd[1671]: Accepted publickey for core from 10.200.12.6 port 59196 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:23:59.895000 audit[1671]: CRED_ACQ pid=1671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:23:59.895000 audit[1671]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff04959aa0 a2=3 a3=0 items=0 ppid=1 pid=1671 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:59.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:23:59.896443 sshd[1671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:23:59.901007 systemd[1]: Started session-9.scope. Feb 8 23:23:59.901433 systemd-logind[1296]: New session 9 of user core. Feb 8 23:23:59.904000 audit[1671]: USER_START pid=1671 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:23:59.906000 audit[1673]: CRED_ACQ pid=1673 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:00.234000 audit[1674]: USER_ACCT pid=1674 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:24:00.234000 audit[1674]: CRED_REFR pid=1674 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:24:00.235420 sudo[1674]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 8 23:24:00.235683 sudo[1674]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:24:00.236000 audit[1674]: USER_START pid=1674 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:24:00.976253 systemd[1]: Reloading. Feb 8 23:24:01.051617 /usr/lib/systemd/system-generators/torcx-generator[1704]: time="2024-02-08T23:24:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:24:01.060317 /usr/lib/systemd/system-generators/torcx-generator[1704]: time="2024-02-08T23:24:01Z" level=info msg="torcx already run" Feb 8 23:24:01.144450 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:24:01.144469 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:24:01.160381 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit: BPF prog-id=32 op=LOAD Feb 8 23:24:01.228000 audit: BPF prog-id=21 op=UNLOAD Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit: BPF prog-id=33 op=LOAD Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.228000 audit: BPF prog-id=34 op=LOAD Feb 8 23:24:01.228000 audit: BPF prog-id=22 op=UNLOAD Feb 8 23:24:01.228000 audit: BPF prog-id=23 op=UNLOAD Feb 8 23:24:01.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.231000 audit: BPF prog-id=35 op=LOAD Feb 8 23:24:01.231000 audit: BPF prog-id=31 op=UNLOAD Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit: BPF prog-id=36 op=LOAD Feb 8 23:24:01.232000 audit: BPF prog-id=15 op=UNLOAD Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit: BPF prog-id=37 op=LOAD Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.232000 audit: BPF prog-id=38 op=LOAD Feb 8 23:24:01.232000 audit: BPF prog-id=16 op=UNLOAD Feb 8 23:24:01.232000 audit: BPF prog-id=17 op=UNLOAD Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.233000 audit: BPF prog-id=39 op=LOAD Feb 8 23:24:01.233000 audit: BPF prog-id=24 op=UNLOAD Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit: BPF prog-id=40 op=LOAD Feb 8 23:24:01.235000 audit: BPF prog-id=26 op=UNLOAD Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit: BPF prog-id=41 op=LOAD Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.235000 audit: BPF prog-id=42 op=LOAD Feb 8 23:24:01.235000 audit: BPF prog-id=27 op=UNLOAD Feb 8 23:24:01.235000 audit: BPF prog-id=28 op=UNLOAD Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.237000 audit: BPF prog-id=43 op=LOAD Feb 8 23:24:01.237000 audit: BPF prog-id=29 op=UNLOAD Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit: BPF prog-id=44 op=LOAD Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.238000 audit: BPF prog-id=45 op=LOAD Feb 8 23:24:01.238000 audit: BPF prog-id=18 op=UNLOAD Feb 8 23:24:01.238000 audit: BPF prog-id=19 op=UNLOAD Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:01.239000 audit: BPF prog-id=46 op=LOAD Feb 8 23:24:01.239000 audit: BPF prog-id=25 op=UNLOAD Feb 8 23:24:01.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:01.251288 systemd[1]: Started kubelet.service. Feb 8 23:24:01.283921 systemd[1]: Starting coreos-metadata.service... Feb 8 23:24:01.317903 kubelet[1765]: E0208 23:24:01.317858 1765 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 8 23:24:01.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 8 23:24:01.319804 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 8 23:24:01.319938 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 8 23:24:01.337122 coreos-metadata[1773]: Feb 08 23:24:01.337 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 8 23:24:01.339898 coreos-metadata[1773]: Feb 08 23:24:01.339 INFO Fetch successful Feb 8 23:24:01.340115 coreos-metadata[1773]: Feb 08 23:24:01.340 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 8 23:24:01.341686 coreos-metadata[1773]: Feb 08 23:24:01.341 INFO Fetch successful Feb 8 23:24:01.341686 coreos-metadata[1773]: Feb 08 23:24:01.341 INFO Fetching http://168.63.129.16/machine/0232722a-899f-474d-a35a-656eb37adf35/9f7c20f9%2D75f3%2D4cef%2D870b%2D6cdd1df19b58.%5Fci%2D3510.3.2%2Da%2D7d5bfcb083?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 8 23:24:01.343232 coreos-metadata[1773]: Feb 08 23:24:01.343 INFO Fetch successful Feb 8 23:24:01.374943 coreos-metadata[1773]: Feb 08 23:24:01.374 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 8 23:24:01.387737 coreos-metadata[1773]: Feb 08 23:24:01.386 INFO Fetch successful Feb 8 23:24:01.395601 systemd[1]: Finished coreos-metadata.service. Feb 8 23:24:01.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:05.021161 systemd[1]: Stopped kubelet.service. Feb 8 23:24:05.026091 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 8 23:24:05.026156 kernel: audit: type=1130 audit(1707434645.020:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:05.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:05.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:05.040473 systemd[1]: Reloading. Feb 8 23:24:05.045374 kernel: audit: type=1131 audit(1707434645.023:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:05.136490 /usr/lib/systemd/system-generators/torcx-generator[1832]: time="2024-02-08T23:24:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:24:05.136526 /usr/lib/systemd/system-generators/torcx-generator[1832]: time="2024-02-08T23:24:05Z" level=info msg="torcx already run" Feb 8 23:24:05.205823 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:24:05.205851 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:24:05.221752 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310932 kernel: audit: type=1400 audit(1707434645.289:359): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.311077 kernel: audit: type=1400 audit(1707434645.289:360): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.322436 kernel: audit: type=1400 audit(1707434645.289:361): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.334287 kernel: audit: type=1400 audit(1707434645.289:362): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.350094 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 8 23:24:05.350177 kernel: audit: type=1400 audit(1707434645.289:363): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.350211 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366431 kernel: audit: type=1400 audit(1707434645.289:364): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit: BPF prog-id=47 op=LOAD Feb 8 23:24:05.298000 audit: BPF prog-id=32 op=UNLOAD Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit: BPF prog-id=48 op=LOAD Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit: BPF prog-id=49 op=LOAD Feb 8 23:24:05.310000 audit: BPF prog-id=33 op=UNLOAD Feb 8 23:24:05.310000 audit: BPF prog-id=34 op=UNLOAD Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit: BPF prog-id=50 op=LOAD Feb 8 23:24:05.321000 audit: BPF prog-id=35 op=UNLOAD Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit: BPF prog-id=51 op=LOAD Feb 8 23:24:05.333000 audit: BPF prog-id=36 op=UNLOAD Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit: BPF prog-id=52 op=LOAD Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.366000 audit: BPF prog-id=54 op=LOAD Feb 8 23:24:05.366000 audit: BPF prog-id=39 op=UNLOAD Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit: BPF prog-id=55 op=LOAD Feb 8 23:24:05.368000 audit: BPF prog-id=40 op=UNLOAD Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit: BPF prog-id=56 op=LOAD Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.368000 audit: BPF prog-id=57 op=LOAD Feb 8 23:24:05.368000 audit: BPF prog-id=41 op=UNLOAD Feb 8 23:24:05.368000 audit: BPF prog-id=42 op=UNLOAD Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.371000 audit: BPF prog-id=58 op=LOAD Feb 8 23:24:05.371000 audit: BPF prog-id=43 op=UNLOAD Feb 8 23:24:05.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit: BPF prog-id=59 op=LOAD Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.372000 audit: BPF prog-id=60 op=LOAD Feb 8 23:24:05.372000 audit: BPF prog-id=44 op=UNLOAD Feb 8 23:24:05.372000 audit: BPF prog-id=45 op=UNLOAD Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.373000 audit: BPF prog-id=61 op=LOAD Feb 8 23:24:05.373000 audit: BPF prog-id=46 op=UNLOAD Feb 8 23:24:05.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:05.390911 systemd[1]: Started kubelet.service. Feb 8 23:24:05.439971 kubelet[1892]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:24:05.440410 kubelet[1892]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 8 23:24:05.440410 kubelet[1892]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:24:05.440530 kubelet[1892]: I0208 23:24:05.440484 1892 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 8 23:24:05.748943 kubelet[1892]: I0208 23:24:05.748906 1892 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 8 23:24:05.748943 kubelet[1892]: I0208 23:24:05.748933 1892 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 8 23:24:05.749200 kubelet[1892]: I0208 23:24:05.749180 1892 server.go:895] "Client rotation is on, will bootstrap in background" Feb 8 23:24:05.751521 kubelet[1892]: I0208 23:24:05.751486 1892 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 8 23:24:05.757283 kubelet[1892]: I0208 23:24:05.757260 1892 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 8 23:24:05.757494 kubelet[1892]: I0208 23:24:05.757477 1892 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 8 23:24:05.757708 kubelet[1892]: I0208 23:24:05.757690 1892 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 8 23:24:05.757880 kubelet[1892]: I0208 23:24:05.757720 1892 topology_manager.go:138] "Creating topology manager with none policy" Feb 8 23:24:05.757880 kubelet[1892]: I0208 23:24:05.757732 1892 container_manager_linux.go:301] "Creating device plugin manager" Feb 8 23:24:05.757880 kubelet[1892]: I0208 23:24:05.757860 1892 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:24:05.758014 kubelet[1892]: I0208 23:24:05.757951 1892 kubelet.go:393] "Attempting to sync node with API server" Feb 8 23:24:05.758014 kubelet[1892]: I0208 23:24:05.757972 1892 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 8 23:24:05.758014 kubelet[1892]: I0208 23:24:05.758002 1892 kubelet.go:309] "Adding apiserver pod source" Feb 8 23:24:05.758111 kubelet[1892]: I0208 23:24:05.758024 1892 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 8 23:24:05.758630 kubelet[1892]: E0208 23:24:05.758600 1892 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:05.758709 kubelet[1892]: E0208 23:24:05.758670 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:05.759365 kubelet[1892]: I0208 23:24:05.759353 1892 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 8 23:24:05.759697 kubelet[1892]: W0208 23:24:05.759685 1892 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 8 23:24:05.760251 kubelet[1892]: I0208 23:24:05.760238 1892 server.go:1232] "Started kubelet" Feb 8 23:24:05.761000 audit[1892]: AVC avc: denied { mac_admin } for pid=1892 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.761000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:24:05.762455 kubelet[1892]: I0208 23:24:05.762443 1892 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 8 23:24:05.763150 kubelet[1892]: I0208 23:24:05.763135 1892 server.go:462] "Adding debug handlers to kubelet server" Feb 8 23:24:05.761000 audit[1892]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008fd620 a1=c0008bd758 a2=c0008fd5f0 a3=25 items=0 ppid=1 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.761000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:24:05.765579 kubelet[1892]: I0208 23:24:05.763389 1892 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 8 23:24:05.764000 audit[1892]: AVC avc: denied { mac_admin } for pid=1892 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.764000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:24:05.764000 audit[1892]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005fb7e0 a1=c00025bfc8 a2=c000a6aab0 a3=25 items=0 ppid=1 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.764000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:24:05.765929 kubelet[1892]: I0208 23:24:05.765629 1892 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 8 23:24:05.765929 kubelet[1892]: I0208 23:24:05.765723 1892 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 8 23:24:05.766154 kubelet[1892]: I0208 23:24:05.766143 1892 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 8 23:24:05.766441 kubelet[1892]: I0208 23:24:05.766426 1892 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 8 23:24:05.766560 kubelet[1892]: E0208 23:24:05.761356 1892 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 8 23:24:05.766659 kubelet[1892]: E0208 23:24:05.766648 1892 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 8 23:24:05.768000 audit[1902]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:05.768000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd922ed70 a2=0 a3=7ffcd922ed5c items=0 ppid=1892 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 8 23:24:05.770000 audit[1903]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:05.770000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffdc6351030 a2=0 a3=7ffdc635101c items=0 ppid=1892 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 8 23:24:05.771802 kubelet[1892]: E0208 23:24:05.771708 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c391bb9c17", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 760220183, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 760220183, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.772187 kubelet[1892]: W0208 23:24:05.772170 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 8 23:24:05.772301 kubelet[1892]: E0208 23:24:05.772290 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 8 23:24:05.772368 kubelet[1892]: I0208 23:24:05.772304 1892 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 8 23:24:05.772480 kubelet[1892]: I0208 23:24:05.772318 1892 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 8 23:24:05.772633 kubelet[1892]: I0208 23:24:05.772619 1892 reconciler_new.go:29] "Reconciler: start to sync state" Feb 8 23:24:05.772000 audit[1905]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:05.772000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc321ae2f0 a2=0 a3=7ffc321ae2dc items=0 ppid=1892 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:24:05.774000 audit[1907]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:05.774000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd1c48ec00 a2=0 a3=7ffd1c48ebec items=0 ppid=1892 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:24:05.778467 kubelet[1892]: W0208 23:24:05.778451 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.31" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 8 23:24:05.778620 kubelet[1892]: E0208 23:24:05.778610 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.31" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 8 23:24:05.779008 kubelet[1892]: E0208 23:24:05.778932 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c3921d7ae4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 766634212, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 766634212, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.779379 kubelet[1892]: E0208 23:24:05.779362 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.31\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 8 23:24:05.780080 kubelet[1892]: W0208 23:24:05.780058 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 8 23:24:05.780189 kubelet[1892]: E0208 23:24:05.780178 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 8 23:24:05.800199 kubelet[1892]: I0208 23:24:05.800130 1892 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 8 23:24:05.800199 kubelet[1892]: I0208 23:24:05.800174 1892 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 8 23:24:05.800199 kubelet[1892]: I0208 23:24:05.800190 1892 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:24:05.800660 kubelet[1892]: E0208 23:24:05.800581 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411cd6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.31 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799423340, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799423340, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.803850 kubelet[1892]: E0208 23:24:05.803430 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411e158", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.31 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799428440, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799428440, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.804278 kubelet[1892]: E0208 23:24:05.804213 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411f350", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.31 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799433040, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799433040, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.803000 audit[1913]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:05.803000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcbe76a8c0 a2=0 a3=7ffcbe76a8ac items=0 ppid=1892 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 8 23:24:05.804818 kubelet[1892]: I0208 23:24:05.804703 1892 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 8 23:24:05.805132 kubelet[1892]: I0208 23:24:05.805117 1892 policy_none.go:49] "None policy: Start" Feb 8 23:24:05.805809 kubelet[1892]: I0208 23:24:05.805793 1892 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 8 23:24:05.805917 kubelet[1892]: I0208 23:24:05.805908 1892 state_mem.go:35] "Initializing new in-memory state store" Feb 8 23:24:05.806000 audit[1914]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:05.806000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffdbfb66e0 a2=0 a3=7fffdbfb66cc items=0 ppid=1892 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 8 23:24:05.807418 kubelet[1892]: I0208 23:24:05.807403 1892 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 8 23:24:05.807538 kubelet[1892]: I0208 23:24:05.807527 1892 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 8 23:24:05.807638 kubelet[1892]: I0208 23:24:05.807629 1892 kubelet.go:2303] "Starting kubelet main sync loop" Feb 8 23:24:05.807764 kubelet[1892]: E0208 23:24:05.807754 1892 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 8 23:24:05.807000 audit[1916]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:05.807000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe11d8e4c0 a2=0 a3=7ffe11d8e4ac items=0 ppid=1892 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 8 23:24:05.809181 kubelet[1892]: W0208 23:24:05.809157 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 8 23:24:05.809348 kubelet[1892]: E0208 23:24:05.809336 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 8 23:24:05.808000 audit[1919]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:05.808000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcbc02bcf0 a2=0 a3=7ffcbc02bcdc items=0 ppid=1892 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 8 23:24:05.809000 audit[1921]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:05.809000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe273c5ac0 a2=0 a3=7ffe273c5aac items=0 ppid=1892 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 8 23:24:05.812000 audit[1918]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:05.812000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef4add5e0 a2=0 a3=7ffef4add5cc items=0 ppid=1892 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 8 23:24:05.814070 systemd[1]: Created slice kubepods.slice. Feb 8 23:24:05.816000 audit[1922]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:05.816000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe58d2bde0 a2=0 a3=7ffe58d2bdcc items=0 ppid=1892 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.818538 systemd[1]: Created slice kubepods-burstable.slice. Feb 8 23:24:05.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 8 23:24:05.820000 audit[1923]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:05.820000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd31f38680 a2=0 a3=7ffd31f3866c items=0 ppid=1892 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 8 23:24:05.821973 systemd[1]: Created slice kubepods-besteffort.slice. Feb 8 23:24:05.830436 kubelet[1892]: I0208 23:24:05.830414 1892 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 8 23:24:05.829000 audit[1892]: AVC avc: denied { mac_admin } for pid=1892 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:05.829000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:24:05.829000 audit[1892]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008fcab0 a1=c000f3b8f0 a2=c0008fca80 a3=25 items=0 ppid=1 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:05.829000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:24:05.830740 kubelet[1892]: I0208 23:24:05.830491 1892 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 8 23:24:05.830740 kubelet[1892]: I0208 23:24:05.830648 1892 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 8 23:24:05.831896 kubelet[1892]: E0208 23:24:05.831882 1892 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.31\" not found" Feb 8 23:24:05.834118 kubelet[1892]: E0208 23:24:05.834063 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c396050cf5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 832142069, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 832142069, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.873813 kubelet[1892]: I0208 23:24:05.873788 1892 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.31" Feb 8 23:24:05.874615 kubelet[1892]: E0208 23:24:05.874581 1892 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.31" Feb 8 23:24:05.875323 kubelet[1892]: E0208 23:24:05.875246 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411cd6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.31 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799423340, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 873717163, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411cd6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.876259 kubelet[1892]: E0208 23:24:05.876201 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411e158", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.31 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799428440, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 873740563, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411e158" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.877155 kubelet[1892]: E0208 23:24:05.877100 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411f350", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.31 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799433040, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 873745163, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411f350" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:05.980973 kubelet[1892]: E0208 23:24:05.980934 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.31\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 8 23:24:06.076068 kubelet[1892]: I0208 23:24:06.075938 1892 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.31" Feb 8 23:24:06.080735 kubelet[1892]: E0208 23:24:06.080710 1892 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.31" Feb 8 23:24:06.082022 kubelet[1892]: E0208 23:24:06.081947 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411cd6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.31 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799423340, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 6, 75896349, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411cd6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:06.082905 kubelet[1892]: E0208 23:24:06.082845 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411e158", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.31 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799428440, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 6, 75903547, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411e158" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:06.083690 kubelet[1892]: E0208 23:24:06.083612 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411f350", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.31 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799433040, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 6, 75908346, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411f350" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:06.382377 kubelet[1892]: E0208 23:24:06.382257 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.31\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 8 23:24:06.482611 kubelet[1892]: I0208 23:24:06.482567 1892 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.31" Feb 8 23:24:06.483544 kubelet[1892]: E0208 23:24:06.483511 1892 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.31" Feb 8 23:24:06.484144 kubelet[1892]: E0208 23:24:06.484063 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411cd6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.31 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799423340, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 6, 482516548, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411cd6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:06.486500 kubelet[1892]: E0208 23:24:06.486430 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411e158", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.31 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799428440, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 6, 482529645, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411e158" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:06.487311 kubelet[1892]: E0208 23:24:06.487236 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31.17b206c39411f350", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.31", UID:"10.200.8.31", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.31 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.31"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 24, 5, 799433040, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 24, 6, 482534343, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.31"}': 'events "10.200.8.31.17b206c39411f350" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:24:06.750881 kubelet[1892]: I0208 23:24:06.750781 1892 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 8 23:24:06.759329 kubelet[1892]: E0208 23:24:06.759235 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:07.133928 kubelet[1892]: E0208 23:24:07.133807 1892 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.31" not found Feb 8 23:24:07.186498 kubelet[1892]: E0208 23:24:07.186453 1892 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.31\" not found" node="10.200.8.31" Feb 8 23:24:07.284624 kubelet[1892]: I0208 23:24:07.284586 1892 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.31" Feb 8 23:24:07.288608 kubelet[1892]: I0208 23:24:07.288574 1892 kubelet_node_status.go:73] "Successfully registered node" node="10.200.8.31" Feb 8 23:24:07.312193 kubelet[1892]: E0208 23:24:07.312165 1892 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.31\" not found" Feb 8 23:24:07.410906 sudo[1674]: pam_unix(sudo:session): session closed for user root Feb 8 23:24:07.409000 audit[1674]: USER_END pid=1674 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:24:07.409000 audit[1674]: CRED_DISP pid=1674 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:24:07.413307 kubelet[1892]: I0208 23:24:07.413270 1892 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 8 23:24:07.413660 env[1312]: time="2024-02-08T23:24:07.413627019Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 8 23:24:07.414027 kubelet[1892]: I0208 23:24:07.413873 1892 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 8 23:24:07.510548 sshd[1671]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:07.510000 audit[1671]: USER_END pid=1671 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:07.510000 audit[1671]: CRED_DISP pid=1671 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:07.513987 systemd[1]: sshd@6-10.200.8.31:22-10.200.12.6:59196.service: Deactivated successfully. Feb 8 23:24:07.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.31:22-10.200.12.6:59196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:07.515075 systemd[1]: session-9.scope: Deactivated successfully. Feb 8 23:24:07.516083 systemd-logind[1296]: Session 9 logged out. Waiting for processes to exit. Feb 8 23:24:07.517425 systemd-logind[1296]: Removed session 9. Feb 8 23:24:07.759856 kubelet[1892]: E0208 23:24:07.759459 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:07.759856 kubelet[1892]: I0208 23:24:07.759485 1892 apiserver.go:52] "Watching apiserver" Feb 8 23:24:07.762013 kubelet[1892]: I0208 23:24:07.761984 1892 topology_manager.go:215] "Topology Admit Handler" podUID="617b12c2-d4c0-4598-8ea3-057bf7f652a2" podNamespace="calico-system" podName="calico-node-lnlx6" Feb 8 23:24:07.762144 kubelet[1892]: I0208 23:24:07.762111 1892 topology_manager.go:215] "Topology Admit Handler" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" podNamespace="calico-system" podName="csi-node-driver-5nhm4" Feb 8 23:24:07.762225 kubelet[1892]: I0208 23:24:07.762208 1892 topology_manager.go:215] "Topology Admit Handler" podUID="e4579123-c10b-4466-8f60-eab919c94f90" podNamespace="kube-system" podName="kube-proxy-l8wpm" Feb 8 23:24:07.762523 kubelet[1892]: E0208 23:24:07.762499 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:07.767308 systemd[1]: Created slice kubepods-besteffort-pod617b12c2_d4c0_4598_8ea3_057bf7f652a2.slice. Feb 8 23:24:07.773287 kubelet[1892]: I0208 23:24:07.773266 1892 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 8 23:24:07.777175 systemd[1]: Created slice kubepods-besteffort-pode4579123_c10b_4466_8f60_eab919c94f90.slice. Feb 8 23:24:07.783536 kubelet[1892]: I0208 23:24:07.783517 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-var-lib-calico\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.783625 kubelet[1892]: I0208 23:24:07.783554 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-cni-bin-dir\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.783625 kubelet[1892]: I0208 23:24:07.783589 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-cni-log-dir\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.783625 kubelet[1892]: I0208 23:24:07.783618 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-flexvol-driver-host\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.783815 kubelet[1892]: I0208 23:24:07.783658 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-549zq\" (UniqueName: \"kubernetes.io/projected/617b12c2-d4c0-4598-8ea3-057bf7f652a2-kube-api-access-549zq\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.783815 kubelet[1892]: I0208 23:24:07.783702 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-lib-modules\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.783815 kubelet[1892]: I0208 23:24:07.783729 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-var-run-calico\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.783815 kubelet[1892]: I0208 23:24:07.783756 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/abebf737-7e5e-4139-9843-490bd08cb1a3-kubelet-dir\") pod \"csi-node-driver-5nhm4\" (UID: \"abebf737-7e5e-4139-9843-490bd08cb1a3\") " pod="calico-system/csi-node-driver-5nhm4" Feb 8 23:24:07.783815 kubelet[1892]: I0208 23:24:07.783783 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e4579123-c10b-4466-8f60-eab919c94f90-lib-modules\") pod \"kube-proxy-l8wpm\" (UID: \"e4579123-c10b-4466-8f60-eab919c94f90\") " pod="kube-system/kube-proxy-l8wpm" Feb 8 23:24:07.784023 kubelet[1892]: I0208 23:24:07.783816 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/abebf737-7e5e-4139-9843-490bd08cb1a3-registration-dir\") pod \"csi-node-driver-5nhm4\" (UID: \"abebf737-7e5e-4139-9843-490bd08cb1a3\") " pod="calico-system/csi-node-driver-5nhm4" Feb 8 23:24:07.784023 kubelet[1892]: I0208 23:24:07.783867 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-25trs\" (UniqueName: \"kubernetes.io/projected/abebf737-7e5e-4139-9843-490bd08cb1a3-kube-api-access-25trs\") pod \"csi-node-driver-5nhm4\" (UID: \"abebf737-7e5e-4139-9843-490bd08cb1a3\") " pod="calico-system/csi-node-driver-5nhm4" Feb 8 23:24:07.784023 kubelet[1892]: I0208 23:24:07.783894 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e4579123-c10b-4466-8f60-eab919c94f90-kube-proxy\") pod \"kube-proxy-l8wpm\" (UID: \"e4579123-c10b-4466-8f60-eab919c94f90\") " pod="kube-system/kube-proxy-l8wpm" Feb 8 23:24:07.784023 kubelet[1892]: I0208 23:24:07.783921 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e4579123-c10b-4466-8f60-eab919c94f90-xtables-lock\") pod \"kube-proxy-l8wpm\" (UID: \"e4579123-c10b-4466-8f60-eab919c94f90\") " pod="kube-system/kube-proxy-l8wpm" Feb 8 23:24:07.784023 kubelet[1892]: I0208 23:24:07.783950 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-cni-net-dir\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.784210 kubelet[1892]: I0208 23:24:07.783977 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/abebf737-7e5e-4139-9843-490bd08cb1a3-varrun\") pod \"csi-node-driver-5nhm4\" (UID: \"abebf737-7e5e-4139-9843-490bd08cb1a3\") " pod="calico-system/csi-node-driver-5nhm4" Feb 8 23:24:07.784210 kubelet[1892]: I0208 23:24:07.784004 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/617b12c2-d4c0-4598-8ea3-057bf7f652a2-tigera-ca-bundle\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.784210 kubelet[1892]: I0208 23:24:07.784031 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/617b12c2-d4c0-4598-8ea3-057bf7f652a2-node-certs\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.784210 kubelet[1892]: I0208 23:24:07.784060 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/abebf737-7e5e-4139-9843-490bd08cb1a3-socket-dir\") pod \"csi-node-driver-5nhm4\" (UID: \"abebf737-7e5e-4139-9843-490bd08cb1a3\") " pod="calico-system/csi-node-driver-5nhm4" Feb 8 23:24:07.784210 kubelet[1892]: I0208 23:24:07.784089 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w97j7\" (UniqueName: \"kubernetes.io/projected/e4579123-c10b-4466-8f60-eab919c94f90-kube-api-access-w97j7\") pod \"kube-proxy-l8wpm\" (UID: \"e4579123-c10b-4466-8f60-eab919c94f90\") " pod="kube-system/kube-proxy-l8wpm" Feb 8 23:24:07.784404 kubelet[1892]: I0208 23:24:07.784135 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-xtables-lock\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.784404 kubelet[1892]: I0208 23:24:07.784162 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/617b12c2-d4c0-4598-8ea3-057bf7f652a2-policysync\") pod \"calico-node-lnlx6\" (UID: \"617b12c2-d4c0-4598-8ea3-057bf7f652a2\") " pod="calico-system/calico-node-lnlx6" Feb 8 23:24:07.892048 kubelet[1892]: E0208 23:24:07.892013 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:07.892218 kubelet[1892]: W0208 23:24:07.892201 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:07.892304 kubelet[1892]: E0208 23:24:07.892293 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:07.899609 kubelet[1892]: E0208 23:24:07.899590 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:07.899746 kubelet[1892]: W0208 23:24:07.899733 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:07.899854 kubelet[1892]: E0208 23:24:07.899821 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:07.909872 kubelet[1892]: E0208 23:24:07.909855 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:07.909981 kubelet[1892]: W0208 23:24:07.909968 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:07.910076 kubelet[1892]: E0208 23:24:07.910065 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:07.910352 kubelet[1892]: E0208 23:24:07.910335 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:07.910352 kubelet[1892]: W0208 23:24:07.910347 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:07.910454 kubelet[1892]: E0208 23:24:07.910364 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:08.079610 env[1312]: time="2024-02-08T23:24:08.076904274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lnlx6,Uid:617b12c2-d4c0-4598-8ea3-057bf7f652a2,Namespace:calico-system,Attempt:0,}" Feb 8 23:24:08.081317 env[1312]: time="2024-02-08T23:24:08.081276650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-l8wpm,Uid:e4579123-c10b-4466-8f60-eab919c94f90,Namespace:kube-system,Attempt:0,}" Feb 8 23:24:08.759767 kubelet[1892]: E0208 23:24:08.759728 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:09.760297 kubelet[1892]: E0208 23:24:09.760267 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:09.808855 kubelet[1892]: E0208 23:24:09.808438 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:10.168313 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2698237507.mount: Deactivated successfully. Feb 8 23:24:10.190875 env[1312]: time="2024-02-08T23:24:10.190812730Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:10.196159 env[1312]: time="2024-02-08T23:24:10.196122639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:10.202305 env[1312]: time="2024-02-08T23:24:10.202273044Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:10.204569 env[1312]: time="2024-02-08T23:24:10.204534294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:10.207373 env[1312]: time="2024-02-08T23:24:10.207340012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:10.209453 env[1312]: time="2024-02-08T23:24:10.209419406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:10.212385 env[1312]: time="2024-02-08T23:24:10.212352893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:10.215164 env[1312]: time="2024-02-08T23:24:10.215131617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:10.286382 env[1312]: time="2024-02-08T23:24:10.285303954Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:24:10.286382 env[1312]: time="2024-02-08T23:24:10.285344344Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:24:10.286382 env[1312]: time="2024-02-08T23:24:10.285360540Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:24:10.286382 env[1312]: time="2024-02-08T23:24:10.285484010Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86 pid=1940 runtime=io.containerd.runc.v2 Feb 8 23:24:10.293001 env[1312]: time="2024-02-08T23:24:10.292933499Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:24:10.293107 env[1312]: time="2024-02-08T23:24:10.292996784Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:24:10.293107 env[1312]: time="2024-02-08T23:24:10.293011280Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:24:10.293213 env[1312]: time="2024-02-08T23:24:10.293155545Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a11a5315914accb190d091fc0339d712a313b8888aa628231fb003bfa1151aea pid=1956 runtime=io.containerd.runc.v2 Feb 8 23:24:10.305457 systemd[1]: Started cri-containerd-df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86.scope. Feb 8 23:24:10.312743 systemd[1]: Started cri-containerd-a11a5315914accb190d091fc0339d712a313b8888aa628231fb003bfa1151aea.scope. Feb 8 23:24:10.350205 kernel: kauditd_printk_skb: 234 callbacks suppressed Feb 8 23:24:10.350301 kernel: audit: type=1400 audit(1707434650.332:544): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.363885 kernel: audit: type=1400 audit(1707434650.332:545): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.363926 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 8 23:24:10.379795 kernel: audit: type=1400 audit(1707434650.332:546): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.379864 kernel: audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.396858 kernel: audit: type=1400 audit(1707434650.332:547): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.396908 kernel: audit: backlog limit exceeded Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.412463 kernel: audit: type=1400 audit(1707434650.332:548): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.425169 kernel: audit: type=1400 audit(1707434650.332:549): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.431848 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit: BPF prog-id=62 op=LOAD Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1956 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:10.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131316135333135393134616363623139306430393166633033333964 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1956 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:10.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131316135333135393134616363623139306430393166633033333964 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit: BPF prog-id=63 op=LOAD Feb 8 23:24:10.349000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00018d1d0 items=0 ppid=1956 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:10.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131316135333135393134616363623139306430393166633033333964 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.349000 audit: BPF prog-id=64 op=LOAD Feb 8 23:24:10.349000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00018d218 items=0 ppid=1956 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:10.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131316135333135393134616363623139306430393166633033333964 Feb 8 23:24:10.350000 audit: BPF prog-id=64 op=UNLOAD Feb 8 23:24:10.350000 audit: BPF prog-id=63 op=UNLOAD Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit: BPF prog-id=65 op=LOAD Feb 8 23:24:10.350000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00018d628 items=0 ppid=1956 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:10.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131316135333135393134616363623139306430393166633033333964 Feb 8 23:24:10.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:10.424000 audit: BPF prog-id=66 op=LOAD Feb 8 23:24:10.437700 env[1312]: time="2024-02-08T23:24:10.437484850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-l8wpm,Uid:e4579123-c10b-4466-8f60-eab919c94f90,Namespace:kube-system,Attempt:0,} returns sandbox id \"a11a5315914accb190d091fc0339d712a313b8888aa628231fb003bfa1151aea\"" Feb 8 23:24:10.440143 env[1312]: time="2024-02-08T23:24:10.440113311Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 8 23:24:10.452342 env[1312]: time="2024-02-08T23:24:10.452310445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lnlx6,Uid:617b12c2-d4c0-4598-8ea3-057bf7f652a2,Namespace:calico-system,Attempt:0,} returns sandbox id \"df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86\"" Feb 8 23:24:10.760844 kubelet[1892]: E0208 23:24:10.760738 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:11.504073 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2089441426.mount: Deactivated successfully. Feb 8 23:24:11.762191 kubelet[1892]: E0208 23:24:11.761812 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:11.810189 kubelet[1892]: E0208 23:24:11.810164 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:12.065192 env[1312]: time="2024-02-08T23:24:12.064788646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:12.073710 env[1312]: time="2024-02-08T23:24:12.073649308Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:12.081028 env[1312]: time="2024-02-08T23:24:12.080937031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:12.086755 env[1312]: time="2024-02-08T23:24:12.086714702Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:12.087255 env[1312]: time="2024-02-08T23:24:12.087219086Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 8 23:24:12.088720 env[1312]: time="2024-02-08T23:24:12.088680250Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 8 23:24:12.089867 env[1312]: time="2024-02-08T23:24:12.089814389Z" level=info msg="CreateContainer within sandbox \"a11a5315914accb190d091fc0339d712a313b8888aa628231fb003bfa1151aea\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 8 23:24:12.120623 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3300280841.mount: Deactivated successfully. Feb 8 23:24:12.142401 env[1312]: time="2024-02-08T23:24:12.142362900Z" level=info msg="CreateContainer within sandbox \"a11a5315914accb190d091fc0339d712a313b8888aa628231fb003bfa1151aea\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cdccb4e6213194c85bfae990782414d6b6da9b216460458aad9adc8f5df5e737\"" Feb 8 23:24:12.143401 env[1312]: time="2024-02-08T23:24:12.143307282Z" level=info msg="StartContainer for \"cdccb4e6213194c85bfae990782414d6b6da9b216460458aad9adc8f5df5e737\"" Feb 8 23:24:12.161521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1283394150.mount: Deactivated successfully. Feb 8 23:24:12.166076 systemd[1]: Started cri-containerd-cdccb4e6213194c85bfae990782414d6b6da9b216460458aad9adc8f5df5e737.scope. Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=1956 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636362346536323133313934633835626661653939303738323431 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit: BPF prog-id=70 op=LOAD Feb 8 23:24:12.179000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0002cbbe0 items=0 ppid=1956 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636362346536323133313934633835626661653939303738323431 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit: BPF prog-id=71 op=LOAD Feb 8 23:24:12.179000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0002cbc28 items=0 ppid=1956 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636362346536323133313934633835626661653939303738323431 Feb 8 23:24:12.179000 audit: BPF prog-id=71 op=UNLOAD Feb 8 23:24:12.179000 audit: BPF prog-id=70 op=UNLOAD Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:12.179000 audit: BPF prog-id=72 op=LOAD Feb 8 23:24:12.179000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0002cbcb8 items=0 ppid=1956 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636362346536323133313934633835626661653939303738323431 Feb 8 23:24:12.199302 env[1312]: time="2024-02-08T23:24:12.199271608Z" level=info msg="StartContainer for \"cdccb4e6213194c85bfae990782414d6b6da9b216460458aad9adc8f5df5e737\" returns successfully" Feb 8 23:24:12.251000 audit[2076]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.251000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda9b0eb30 a2=0 a3=7ffda9b0eb1c items=0 ppid=2037 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 8 23:24:12.253000 audit[2077]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2077 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.253000 audit[2077]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1a4b6df0 a2=0 a3=7ffe1a4b6ddc items=0 ppid=2037 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 8 23:24:12.254000 audit[2079]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.254000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff121193a0 a2=0 a3=7fff1211938c items=0 ppid=2037 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.254000 audit[2080]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2080 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.254000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf4163150 a2=0 a3=7ffcf416313c items=0 ppid=2037 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 8 23:24:12.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 8 23:24:12.256000 audit[2081]: NETFILTER_CFG table=filter:21 family=10 entries=1 op=nft_register_chain pid=2081 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.256000 audit[2081]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5a10cf30 a2=0 a3=7ffc5a10cf1c items=0 ppid=2037 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 8 23:24:12.256000 audit[2082]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.256000 audit[2082]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0666ee40 a2=0 a3=7fff0666ee2c items=0 ppid=2037 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 8 23:24:12.352000 audit[2083]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.352000 audit[2083]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd34b77580 a2=0 a3=7ffd34b7756c items=0 ppid=2037 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 8 23:24:12.356000 audit[2085]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.356000 audit[2085]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe1841a860 a2=0 a3=7ffe1841a84c items=0 ppid=2037 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 8 23:24:12.360000 audit[2088]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.360000 audit[2088]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe54d6c1e0 a2=0 a3=7ffe54d6c1cc items=0 ppid=2037 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 8 23:24:12.361000 audit[2089]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.361000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9439e350 a2=0 a3=7fff9439e33c items=0 ppid=2037 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 8 23:24:12.363000 audit[2091]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.363000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe162933d0 a2=0 a3=7ffe162933bc items=0 ppid=2037 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 8 23:24:12.364000 audit[2092]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.364000 audit[2092]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca5475950 a2=0 a3=7ffca547593c items=0 ppid=2037 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 8 23:24:12.367000 audit[2094]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.367000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe3447aaf0 a2=0 a3=7ffe3447aadc items=0 ppid=2037 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 8 23:24:12.370000 audit[2097]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.370000 audit[2097]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff70f9c270 a2=0 a3=7fff70f9c25c items=0 ppid=2037 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 8 23:24:12.371000 audit[2098]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.371000 audit[2098]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff322a2d90 a2=0 a3=7fff322a2d7c items=0 ppid=2037 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 8 23:24:12.374000 audit[2100]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.374000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb742bc80 a2=0 a3=7ffeb742bc6c items=0 ppid=2037 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 8 23:24:12.375000 audit[2101]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.375000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe07eb0900 a2=0 a3=7ffe07eb08ec items=0 ppid=2037 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 8 23:24:12.377000 audit[2103]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.377000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd90e7da80 a2=0 a3=7ffd90e7da6c items=0 ppid=2037 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:24:12.381000 audit[2106]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.381000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe31b77910 a2=0 a3=7ffe31b778fc items=0 ppid=2037 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:24:12.384000 audit[2109]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.384000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9c9ac8b0 a2=0 a3=7ffd9c9ac89c items=0 ppid=2037 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 8 23:24:12.385000 audit[2110]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.385000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff353c850 a2=0 a3=7ffff353c83c items=0 ppid=2037 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 8 23:24:12.387000 audit[2112]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.387000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdb46563d0 a2=0 a3=7ffdb46563bc items=0 ppid=2037 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:24:12.502000 audit[2117]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.502000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff6f4fc880 a2=0 a3=7fff6f4fc86c items=0 ppid=2037 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:24:12.503000 audit[2118]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.503000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbb297f10 a2=0 a3=7ffcbb297efc items=0 ppid=2037 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 8 23:24:12.505000 audit[2120]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:24:12.505000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff3586b190 a2=0 a3=7fff3586b17c items=0 ppid=2037 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 8 23:24:12.531000 audit[2126]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:12.531000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe09a02020 a2=0 a3=7ffe09a0200c items=0 ppid=2037 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:12.615000 audit[2126]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:12.615000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe09a02020 a2=0 a3=7ffe09a0200c items=0 ppid=2037 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:12.649000 audit[2134]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.649000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf34987a0 a2=0 a3=7ffcf349878c items=0 ppid=2037 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 8 23:24:12.651000 audit[2136]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.651000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1f11e570 a2=0 a3=7ffd1f11e55c items=0 ppid=2037 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 8 23:24:12.655000 audit[2139]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.655000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff945f3c20 a2=0 a3=7fff945f3c0c items=0 ppid=2037 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 8 23:24:12.656000 audit[2140]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.656000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8a9eed80 a2=0 a3=7fff8a9eed6c items=0 ppid=2037 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 8 23:24:12.658000 audit[2142]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.658000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeab0728d0 a2=0 a3=7ffeab0728bc items=0 ppid=2037 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 8 23:24:12.660000 audit[2143]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.660000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee3c29860 a2=0 a3=7ffee3c2984c items=0 ppid=2037 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 8 23:24:12.662000 audit[2145]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2145 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.662000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe76958540 a2=0 a3=7ffe7695852c items=0 ppid=2037 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 8 23:24:12.665000 audit[2148]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.665000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff067c4cd0 a2=0 a3=7fff067c4cbc items=0 ppid=2037 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 8 23:24:12.666000 audit[2149]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.666000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff33ba1530 a2=0 a3=7fff33ba151c items=0 ppid=2037 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 8 23:24:12.669000 audit[2151]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.669000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdfddfc680 a2=0 a3=7ffdfddfc66c items=0 ppid=2037 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 8 23:24:12.670000 audit[2152]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.670000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8b7e4180 a2=0 a3=7ffd8b7e416c items=0 ppid=2037 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 8 23:24:12.672000 audit[2154]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.672000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd39e1d8a0 a2=0 a3=7ffd39e1d88c items=0 ppid=2037 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:24:12.676000 audit[2157]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.676000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed2bc6330 a2=0 a3=7ffed2bc631c items=0 ppid=2037 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 8 23:24:12.680000 audit[2160]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.680000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcdae69f0 a2=0 a3=7fffcdae69dc items=0 ppid=2037 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 8 23:24:12.681000 audit[2161]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.681000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc49eb0430 a2=0 a3=7ffc49eb041c items=0 ppid=2037 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 8 23:24:12.683000 audit[2163]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.683000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd412ece00 a2=0 a3=7ffd412ecdec items=0 ppid=2037 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:24:12.686000 audit[2166]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.686000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffa0fab4a0 a2=0 a3=7fffa0fab48c items=0 ppid=2037 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:24:12.687000 audit[2167]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.687000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd5444fe0 a2=0 a3=7fffd5444fcc items=0 ppid=2037 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 8 23:24:12.689000 audit[2169]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.689000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc522367c0 a2=0 a3=7ffc522367ac items=0 ppid=2037 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 8 23:24:12.690000 audit[2170]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.690000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa45caaa0 a2=0 a3=7fffa45caa8c items=0 ppid=2037 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 8 23:24:12.692000 audit[2172]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.692000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0d31d440 a2=0 a3=7ffd0d31d42c items=0 ppid=2037 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:24:12.696000 audit[2175]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:24:12.696000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe605ddb80 a2=0 a3=7ffe605ddb6c items=0 ppid=2037 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:24:12.699000 audit[2177]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 8 23:24:12.699000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffddd5a3400 a2=0 a3=7ffddd5a33ec items=0 ppid=2037 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.699000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:12.699000 audit[2177]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 8 23:24:12.699000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffddd5a3400 a2=0 a3=7ffddd5a33ec items=0 ppid=2037 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:12.699000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:12.762510 kubelet[1892]: E0208 23:24:12.762477 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:12.831170 kubelet[1892]: I0208 23:24:12.831129 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-l8wpm" podStartSLOduration=4.182874544 podCreationTimestamp="2024-02-08 23:24:07 +0000 UTC" firstStartedPulling="2024-02-08 23:24:10.439479165 +0000 UTC m=+5.044604446" lastFinishedPulling="2024-02-08 23:24:12.087687078 +0000 UTC m=+6.692812359" observedRunningTime="2024-02-08 23:24:12.830797123 +0000 UTC m=+7.435922404" watchObservedRunningTime="2024-02-08 23:24:12.831082457 +0000 UTC m=+7.436207738" Feb 8 23:24:12.912899 kubelet[1892]: E0208 23:24:12.912864 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.912899 kubelet[1892]: W0208 23:24:12.912885 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.913134 kubelet[1892]: E0208 23:24:12.912909 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.913199 kubelet[1892]: E0208 23:24:12.913161 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.913199 kubelet[1892]: W0208 23:24:12.913175 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.913199 kubelet[1892]: E0208 23:24:12.913196 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.913425 kubelet[1892]: E0208 23:24:12.913402 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.913425 kubelet[1892]: W0208 23:24:12.913419 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.913584 kubelet[1892]: E0208 23:24:12.913438 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.913661 kubelet[1892]: E0208 23:24:12.913649 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.913720 kubelet[1892]: W0208 23:24:12.913663 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.913720 kubelet[1892]: E0208 23:24:12.913680 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.913936 kubelet[1892]: E0208 23:24:12.913914 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.913936 kubelet[1892]: W0208 23:24:12.913930 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.914092 kubelet[1892]: E0208 23:24:12.913949 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.914164 kubelet[1892]: E0208 23:24:12.914151 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.914244 kubelet[1892]: W0208 23:24:12.914165 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.914244 kubelet[1892]: E0208 23:24:12.914182 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.914396 kubelet[1892]: E0208 23:24:12.914378 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.914396 kubelet[1892]: W0208 23:24:12.914394 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.914549 kubelet[1892]: E0208 23:24:12.914412 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.914624 kubelet[1892]: E0208 23:24:12.914613 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.914683 kubelet[1892]: W0208 23:24:12.914626 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.914683 kubelet[1892]: E0208 23:24:12.914645 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.914894 kubelet[1892]: E0208 23:24:12.914874 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.914894 kubelet[1892]: W0208 23:24:12.914889 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.915042 kubelet[1892]: E0208 23:24:12.914908 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.915129 kubelet[1892]: E0208 23:24:12.915108 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.915129 kubelet[1892]: W0208 23:24:12.915124 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.915275 kubelet[1892]: E0208 23:24:12.915142 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.915328 kubelet[1892]: E0208 23:24:12.915322 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.915374 kubelet[1892]: W0208 23:24:12.915331 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.915374 kubelet[1892]: E0208 23:24:12.915346 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.915538 kubelet[1892]: E0208 23:24:12.915523 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.915538 kubelet[1892]: W0208 23:24:12.915534 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.915648 kubelet[1892]: E0208 23:24:12.915558 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.915782 kubelet[1892]: E0208 23:24:12.915768 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.915782 kubelet[1892]: W0208 23:24:12.915779 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.915920 kubelet[1892]: E0208 23:24:12.915793 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.915966 kubelet[1892]: E0208 23:24:12.915960 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.916007 kubelet[1892]: W0208 23:24:12.915969 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.916007 kubelet[1892]: E0208 23:24:12.915983 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.916149 kubelet[1892]: E0208 23:24:12.916132 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.916149 kubelet[1892]: W0208 23:24:12.916144 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.916272 kubelet[1892]: E0208 23:24:12.916159 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.916328 kubelet[1892]: E0208 23:24:12.916314 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.916372 kubelet[1892]: W0208 23:24:12.916328 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.916372 kubelet[1892]: E0208 23:24:12.916342 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.916511 kubelet[1892]: E0208 23:24:12.916494 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.916511 kubelet[1892]: W0208 23:24:12.916506 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.916631 kubelet[1892]: E0208 23:24:12.916520 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.916689 kubelet[1892]: E0208 23:24:12.916673 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.916735 kubelet[1892]: W0208 23:24:12.916689 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.916735 kubelet[1892]: E0208 23:24:12.916703 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.916886 kubelet[1892]: E0208 23:24:12.916870 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.916886 kubelet[1892]: W0208 23:24:12.916882 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.917013 kubelet[1892]: E0208 23:24:12.916897 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.917068 kubelet[1892]: E0208 23:24:12.917054 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.917109 kubelet[1892]: W0208 23:24:12.917096 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.917148 kubelet[1892]: E0208 23:24:12.917116 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.931595 kubelet[1892]: E0208 23:24:12.931526 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.931595 kubelet[1892]: W0208 23:24:12.931567 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.931917 kubelet[1892]: E0208 23:24:12.931618 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.932036 kubelet[1892]: E0208 23:24:12.932022 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.932036 kubelet[1892]: W0208 23:24:12.932033 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.932151 kubelet[1892]: E0208 23:24:12.932053 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.932287 kubelet[1892]: E0208 23:24:12.932271 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.932287 kubelet[1892]: W0208 23:24:12.932283 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.932396 kubelet[1892]: E0208 23:24:12.932313 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.932527 kubelet[1892]: E0208 23:24:12.932512 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.932527 kubelet[1892]: W0208 23:24:12.932523 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.932653 kubelet[1892]: E0208 23:24:12.932543 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.932744 kubelet[1892]: E0208 23:24:12.932728 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.932744 kubelet[1892]: W0208 23:24:12.932740 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.932861 kubelet[1892]: E0208 23:24:12.932759 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.932998 kubelet[1892]: E0208 23:24:12.932983 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.933063 kubelet[1892]: W0208 23:24:12.933002 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.933108 kubelet[1892]: E0208 23:24:12.933087 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.933369 kubelet[1892]: E0208 23:24:12.933353 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.933369 kubelet[1892]: W0208 23:24:12.933365 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.933520 kubelet[1892]: E0208 23:24:12.933385 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.933600 kubelet[1892]: E0208 23:24:12.933583 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.933600 kubelet[1892]: W0208 23:24:12.933597 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.933718 kubelet[1892]: E0208 23:24:12.933616 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.933810 kubelet[1892]: E0208 23:24:12.933796 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.933810 kubelet[1892]: W0208 23:24:12.933807 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.933939 kubelet[1892]: E0208 23:24:12.933826 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.934042 kubelet[1892]: E0208 23:24:12.934029 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.934042 kubelet[1892]: W0208 23:24:12.934040 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.934143 kubelet[1892]: E0208 23:24:12.934058 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.934275 kubelet[1892]: E0208 23:24:12.934261 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.934275 kubelet[1892]: W0208 23:24:12.934272 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.934385 kubelet[1892]: E0208 23:24:12.934296 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:12.934644 kubelet[1892]: E0208 23:24:12.934629 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:12.934644 kubelet[1892]: W0208 23:24:12.934640 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:12.934743 kubelet[1892]: E0208 23:24:12.934655 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.763506 kubelet[1892]: E0208 23:24:13.763454 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:13.810397 kubelet[1892]: E0208 23:24:13.810356 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:13.924841 kubelet[1892]: E0208 23:24:13.924798 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.924841 kubelet[1892]: W0208 23:24:13.924818 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.925084 kubelet[1892]: E0208 23:24:13.924853 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.925084 kubelet[1892]: E0208 23:24:13.925059 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.925084 kubelet[1892]: W0208 23:24:13.925070 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.925084 kubelet[1892]: E0208 23:24:13.925085 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.925292 kubelet[1892]: E0208 23:24:13.925251 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.925292 kubelet[1892]: W0208 23:24:13.925260 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.925292 kubelet[1892]: E0208 23:24:13.925275 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.925442 kubelet[1892]: E0208 23:24:13.925430 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.925487 kubelet[1892]: W0208 23:24:13.925441 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.925487 kubelet[1892]: E0208 23:24:13.925456 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.925643 kubelet[1892]: E0208 23:24:13.925622 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.925643 kubelet[1892]: W0208 23:24:13.925637 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.925777 kubelet[1892]: E0208 23:24:13.925653 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.925858 kubelet[1892]: E0208 23:24:13.925838 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.925858 kubelet[1892]: W0208 23:24:13.925850 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.925991 kubelet[1892]: E0208 23:24:13.925866 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.926053 kubelet[1892]: E0208 23:24:13.926034 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.926053 kubelet[1892]: W0208 23:24:13.926047 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.926164 kubelet[1892]: E0208 23:24:13.926062 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.926274 kubelet[1892]: E0208 23:24:13.926258 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.926274 kubelet[1892]: W0208 23:24:13.926271 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.926414 kubelet[1892]: E0208 23:24:13.926287 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.926482 kubelet[1892]: E0208 23:24:13.926472 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.926531 kubelet[1892]: W0208 23:24:13.926483 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.926531 kubelet[1892]: E0208 23:24:13.926498 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.926676 kubelet[1892]: E0208 23:24:13.926658 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.926676 kubelet[1892]: W0208 23:24:13.926672 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.926800 kubelet[1892]: E0208 23:24:13.926687 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.926879 kubelet[1892]: E0208 23:24:13.926861 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.926879 kubelet[1892]: W0208 23:24:13.926875 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.927004 kubelet[1892]: E0208 23:24:13.926904 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.927101 kubelet[1892]: E0208 23:24:13.927086 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.927101 kubelet[1892]: W0208 23:24:13.927097 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.927232 kubelet[1892]: E0208 23:24:13.927112 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.927308 kubelet[1892]: E0208 23:24:13.927293 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.927308 kubelet[1892]: W0208 23:24:13.927307 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.927430 kubelet[1892]: E0208 23:24:13.927322 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.927500 kubelet[1892]: E0208 23:24:13.927489 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.927550 kubelet[1892]: W0208 23:24:13.927500 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.927550 kubelet[1892]: E0208 23:24:13.927516 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.927677 kubelet[1892]: E0208 23:24:13.927666 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.927677 kubelet[1892]: W0208 23:24:13.927676 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.927786 kubelet[1892]: E0208 23:24:13.927690 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.927905 kubelet[1892]: E0208 23:24:13.927890 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.927905 kubelet[1892]: W0208 23:24:13.927902 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.928040 kubelet[1892]: E0208 23:24:13.927917 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.928104 kubelet[1892]: E0208 23:24:13.928086 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.928104 kubelet[1892]: W0208 23:24:13.928099 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.928215 kubelet[1892]: E0208 23:24:13.928114 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.928297 kubelet[1892]: E0208 23:24:13.928279 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.928297 kubelet[1892]: W0208 23:24:13.928293 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.928418 kubelet[1892]: E0208 23:24:13.928307 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.928473 kubelet[1892]: E0208 23:24:13.928462 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.928517 kubelet[1892]: W0208 23:24:13.928473 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.928517 kubelet[1892]: E0208 23:24:13.928487 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.928703 kubelet[1892]: E0208 23:24:13.928645 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.928703 kubelet[1892]: W0208 23:24:13.928654 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.928703 kubelet[1892]: E0208 23:24:13.928668 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.938007 kubelet[1892]: E0208 23:24:13.937985 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.938100 kubelet[1892]: W0208 23:24:13.938003 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.938100 kubelet[1892]: E0208 23:24:13.938029 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.938296 kubelet[1892]: E0208 23:24:13.938281 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.938352 kubelet[1892]: W0208 23:24:13.938303 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.938352 kubelet[1892]: E0208 23:24:13.938322 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.938554 kubelet[1892]: E0208 23:24:13.938540 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.938554 kubelet[1892]: W0208 23:24:13.938554 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.938655 kubelet[1892]: E0208 23:24:13.938580 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.938785 kubelet[1892]: E0208 23:24:13.938771 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.938845 kubelet[1892]: W0208 23:24:13.938785 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.938845 kubelet[1892]: E0208 23:24:13.938810 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.939029 kubelet[1892]: E0208 23:24:13.939016 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.939029 kubelet[1892]: W0208 23:24:13.939029 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.939121 kubelet[1892]: E0208 23:24:13.939047 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.939276 kubelet[1892]: E0208 23:24:13.939263 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.939329 kubelet[1892]: W0208 23:24:13.939276 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.939329 kubelet[1892]: E0208 23:24:13.939301 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.939710 kubelet[1892]: E0208 23:24:13.939694 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.939781 kubelet[1892]: W0208 23:24:13.939710 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.939843 kubelet[1892]: E0208 23:24:13.939801 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.939968 kubelet[1892]: E0208 23:24:13.939955 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.940022 kubelet[1892]: W0208 23:24:13.939969 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.940022 kubelet[1892]: E0208 23:24:13.939984 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.940183 kubelet[1892]: E0208 23:24:13.940172 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.940183 kubelet[1892]: W0208 23:24:13.940182 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.940282 kubelet[1892]: E0208 23:24:13.940197 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.940553 kubelet[1892]: E0208 23:24:13.940391 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.940553 kubelet[1892]: W0208 23:24:13.940403 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.940553 kubelet[1892]: E0208 23:24:13.940419 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.940756 kubelet[1892]: E0208 23:24:13.940734 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.940756 kubelet[1892]: W0208 23:24:13.940745 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.940874 kubelet[1892]: E0208 23:24:13.940763 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:13.941140 kubelet[1892]: E0208 23:24:13.941123 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:24:13.941140 kubelet[1892]: W0208 23:24:13.941137 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:24:13.941242 kubelet[1892]: E0208 23:24:13.941153 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:24:14.764190 kubelet[1892]: E0208 23:24:14.764155 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:15.471046 env[1312]: time="2024-02-08T23:24:15.470992698Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:15.476654 env[1312]: time="2024-02-08T23:24:15.476617106Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:15.481045 env[1312]: time="2024-02-08T23:24:15.480953387Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:15.485138 env[1312]: time="2024-02-08T23:24:15.485045220Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:15.486069 env[1312]: time="2024-02-08T23:24:15.486039110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 8 23:24:15.488498 env[1312]: time="2024-02-08T23:24:15.488470295Z" level=info msg="CreateContainer within sandbox \"df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 8 23:24:15.527230 env[1312]: time="2024-02-08T23:24:15.527176493Z" level=info msg="CreateContainer within sandbox \"df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"36b236d2bf2fb7529c1f92090f7cd390f53ed737c281d477e6418c96157c7f1a\"" Feb 8 23:24:15.527848 env[1312]: time="2024-02-08T23:24:15.527783964Z" level=info msg="StartContainer for \"36b236d2bf2fb7529c1f92090f7cd390f53ed737c281d477e6418c96157c7f1a\"" Feb 8 23:24:15.552179 systemd[1]: Started cri-containerd-36b236d2bf2fb7529c1f92090f7cd390f53ed737c281d477e6418c96157c7f1a.scope. Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.571675 kernel: kauditd_printk_skb: 364 callbacks suppressed Feb 8 23:24:15.571765 kernel: audit: type=1400 audit(1707434655.566:629): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=1940 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:15.601993 kernel: audit: type=1300 audit(1707434655.566:629): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=1940 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:15.602066 kernel: audit: type=1327 audit(1707434655.566:629): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623233366432626632666237353239633166393230393066376364 Feb 8 23:24:15.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623233366432626632666237353239633166393230393066376364 Feb 8 23:24:15.631139 kernel: audit: type=1400 audit(1707434655.566:630): avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.657705 kernel: audit: type=1400 audit(1707434655.566:630): avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.657800 kernel: audit: type=1400 audit(1707434655.566:630): avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.672868 kernel: audit: type=1400 audit(1707434655.566:630): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.686256 kernel: audit: type=1400 audit(1707434655.566:630): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.686674 systemd[1]: cri-containerd-36b236d2bf2fb7529c1f92090f7cd390f53ed737c281d477e6418c96157c7f1a.scope: Deactivated successfully. Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.699798 env[1312]: time="2024-02-08T23:24:15.699767822Z" level=info msg="StartContainer for \"36b236d2bf2fb7529c1f92090f7cd390f53ed737c281d477e6418c96157c7f1a\" returns successfully" Feb 8 23:24:15.712704 kernel: audit: type=1400 audit(1707434655.566:630): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.712772 kernel: audit: type=1400 audit(1707434655.566:630): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.566000 audit: BPF prog-id=73 op=LOAD Feb 8 23:24:15.566000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00033fef0 items=0 ppid=1940 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:15.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623233366432626632666237353239633166393230393066376364 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.583000 audit: BPF prog-id=74 op=LOAD Feb 8 23:24:15.583000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00033ff38 items=0 ppid=1940 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:15.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623233366432626632666237353239633166393230393066376364 Feb 8 23:24:15.618000 audit: BPF prog-id=74 op=UNLOAD Feb 8 23:24:15.618000 audit: BPF prog-id=73 op=UNLOAD Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:15.618000 audit: BPF prog-id=75 op=LOAD Feb 8 23:24:15.618000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00033ffc8 items=0 ppid=1940 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:15.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623233366432626632666237353239633166393230393066376364 Feb 8 23:24:15.712000 audit: BPF prog-id=75 op=UNLOAD Feb 8 23:24:15.718136 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-36b236d2bf2fb7529c1f92090f7cd390f53ed737c281d477e6418c96157c7f1a-rootfs.mount: Deactivated successfully. Feb 8 23:24:15.796910 kubelet[1892]: E0208 23:24:15.765040 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:15.810815 kubelet[1892]: E0208 23:24:15.810743 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:16.555068 env[1312]: time="2024-02-08T23:24:16.554994441Z" level=info msg="shim disconnected" id=36b236d2bf2fb7529c1f92090f7cd390f53ed737c281d477e6418c96157c7f1a Feb 8 23:24:16.555068 env[1312]: time="2024-02-08T23:24:16.555065626Z" level=warning msg="cleaning up after shim disconnected" id=36b236d2bf2fb7529c1f92090f7cd390f53ed737c281d477e6418c96157c7f1a namespace=k8s.io Feb 8 23:24:16.555711 env[1312]: time="2024-02-08T23:24:16.555079423Z" level=info msg="cleaning up dead shim" Feb 8 23:24:16.562972 env[1312]: time="2024-02-08T23:24:16.562933903Z" level=warning msg="cleanup warnings time=\"2024-02-08T23:24:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2293 runtime=io.containerd.runc.v2\n" Feb 8 23:24:16.766243 kubelet[1892]: E0208 23:24:16.766182 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:16.833211 env[1312]: time="2024-02-08T23:24:16.833082094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 8 23:24:17.766566 kubelet[1892]: E0208 23:24:17.766520 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:17.808534 kubelet[1892]: E0208 23:24:17.808469 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:18.767378 kubelet[1892]: E0208 23:24:18.767304 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:18.846930 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2467505.mount: Deactivated successfully. Feb 8 23:24:19.767769 kubelet[1892]: E0208 23:24:19.767703 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:19.808147 kubelet[1892]: E0208 23:24:19.808117 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:20.768752 kubelet[1892]: E0208 23:24:20.768711 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:21.769745 kubelet[1892]: E0208 23:24:21.769695 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:21.809847 kubelet[1892]: E0208 23:24:21.809466 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:22.533272 env[1312]: time="2024-02-08T23:24:22.533221139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:22.539812 env[1312]: time="2024-02-08T23:24:22.539771888Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:22.543791 env[1312]: time="2024-02-08T23:24:22.543756388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:22.547098 env[1312]: time="2024-02-08T23:24:22.547062907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:22.547758 env[1312]: time="2024-02-08T23:24:22.547726090Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 8 23:24:22.550199 env[1312]: time="2024-02-08T23:24:22.550167262Z" level=info msg="CreateContainer within sandbox \"df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 8 23:24:22.575395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3004686286.mount: Deactivated successfully. Feb 8 23:24:22.587852 env[1312]: time="2024-02-08T23:24:22.587415218Z" level=info msg="CreateContainer within sandbox \"df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71\"" Feb 8 23:24:22.587964 env[1312]: time="2024-02-08T23:24:22.587885435Z" level=info msg="StartContainer for \"6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71\"" Feb 8 23:24:22.611551 systemd[1]: run-containerd-runc-k8s.io-6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71-runc.SXyY3Q.mount: Deactivated successfully. Feb 8 23:24:22.615984 systemd[1]: Started cri-containerd-6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71.scope. Feb 8 23:24:22.646822 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 8 23:24:22.647032 kernel: audit: type=1400 audit(1707434662.628:636): avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.628000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.628000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1940 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:22.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346162343963303739346664393032626335343935653835633938 Feb 8 23:24:22.681999 kernel: audit: type=1300 audit(1707434662.628:636): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1940 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:22.682098 kernel: audit: type=1327 audit(1707434662.628:636): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346162343963303739346664393032626335343935653835633938 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.710873 kernel: audit: type=1400 audit(1707434662.629:637): avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.710959 kernel: audit: type=1400 audit(1707434662.629:637): avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.710988 kernel: audit: type=1400 audit(1707434662.629:637): avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.733605 kernel: audit: type=1400 audit(1707434662.629:637): avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.733687 kernel: audit: type=1400 audit(1707434662.629:637): avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.745456 env[1312]: time="2024-02-08T23:24:22.745388564Z" level=info msg="StartContainer for \"6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71\" returns successfully" Feb 8 23:24:22.746407 kernel: audit: type=1400 audit(1707434662.629:637): avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.768688 kernel: audit: type=1400 audit(1707434662.629:637): avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.629000 audit: BPF prog-id=76 op=LOAD Feb 8 23:24:22.629000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00030a490 items=0 ppid=1940 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:22.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346162343963303739346664393032626335343935653835633938 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit: BPF prog-id=77 op=LOAD Feb 8 23:24:22.646000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00030a4d8 items=0 ppid=1940 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:22.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346162343963303739346664393032626335343935653835633938 Feb 8 23:24:22.646000 audit: BPF prog-id=77 op=UNLOAD Feb 8 23:24:22.646000 audit: BPF prog-id=76 op=UNLOAD Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:22.646000 audit: BPF prog-id=78 op=LOAD Feb 8 23:24:22.646000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00030a568 items=0 ppid=1940 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:22.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346162343963303739346664393032626335343935653835633938 Feb 8 23:24:22.770067 kubelet[1892]: E0208 23:24:22.769925 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:23.771132 kubelet[1892]: E0208 23:24:23.771077 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:23.808510 kubelet[1892]: E0208 23:24:23.808478 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:24.443939 env[1312]: time="2024-02-08T23:24:24.443861470Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 8 23:24:24.446196 systemd[1]: cri-containerd-6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71.scope: Deactivated successfully. Feb 8 23:24:24.449000 audit: BPF prog-id=78 op=UNLOAD Feb 8 23:24:24.464285 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71-rootfs.mount: Deactivated successfully. Feb 8 23:24:24.518439 kubelet[1892]: I0208 23:24:24.518406 1892 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 8 23:24:24.951994 kubelet[1892]: E0208 23:24:24.771790 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:25.758416 kubelet[1892]: E0208 23:24:25.758350 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:25.772601 kubelet[1892]: E0208 23:24:25.772570 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:25.812702 systemd[1]: Created slice kubepods-besteffort-podabebf737_7e5e_4139_9843_490bd08cb1a3.slice. Feb 8 23:24:25.815296 env[1312]: time="2024-02-08T23:24:25.815254985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5nhm4,Uid:abebf737-7e5e-4139-9843-490bd08cb1a3,Namespace:calico-system,Attempt:0,}" Feb 8 23:24:26.103894 env[1312]: time="2024-02-08T23:24:26.103481344Z" level=info msg="shim disconnected" id=6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71 Feb 8 23:24:26.103894 env[1312]: time="2024-02-08T23:24:26.103521838Z" level=warning msg="cleaning up after shim disconnected" id=6e4ab49c0794fd902bc5495e85c98fc069f3dee30908151bf8f18dce961e8c71 namespace=k8s.io Feb 8 23:24:26.103894 env[1312]: time="2024-02-08T23:24:26.103533436Z" level=info msg="cleaning up dead shim" Feb 8 23:24:26.112086 env[1312]: time="2024-02-08T23:24:26.112043489Z" level=warning msg="cleanup warnings time=\"2024-02-08T23:24:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2359 runtime=io.containerd.runc.v2\n" Feb 8 23:24:26.164767 env[1312]: time="2024-02-08T23:24:26.164700951Z" level=error msg="Failed to destroy network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:26.167603 env[1312]: time="2024-02-08T23:24:26.166980790Z" level=error msg="encountered an error cleaning up failed sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:26.167603 env[1312]: time="2024-02-08T23:24:26.167080474Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5nhm4,Uid:abebf737-7e5e-4139-9843-490bd08cb1a3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:26.167719 kubelet[1892]: E0208 23:24:26.167400 1892 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:26.167719 kubelet[1892]: E0208 23:24:26.167482 1892 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5nhm4" Feb 8 23:24:26.167719 kubelet[1892]: E0208 23:24:26.167509 1892 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5nhm4" Feb 8 23:24:26.166552 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22-shm.mount: Deactivated successfully. Feb 8 23:24:26.168219 kubelet[1892]: E0208 23:24:26.167584 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5nhm4_calico-system(abebf737-7e5e-4139-9843-490bd08cb1a3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5nhm4_calico-system(abebf737-7e5e-4139-9843-490bd08cb1a3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:26.773629 kubelet[1892]: E0208 23:24:26.773530 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:26.862607 env[1312]: time="2024-02-08T23:24:26.862555557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 8 23:24:26.863874 kubelet[1892]: I0208 23:24:26.863847 1892 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:24:26.864455 env[1312]: time="2024-02-08T23:24:26.864405164Z" level=info msg="StopPodSandbox for \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\"" Feb 8 23:24:26.893662 env[1312]: time="2024-02-08T23:24:26.893618239Z" level=error msg="StopPodSandbox for \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\" failed" error="failed to destroy network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:26.893929 kubelet[1892]: E0208 23:24:26.893901 1892 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:24:26.894030 kubelet[1892]: E0208 23:24:26.893965 1892 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22"} Feb 8 23:24:26.894030 kubelet[1892]: E0208 23:24:26.894011 1892 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"abebf737-7e5e-4139-9843-490bd08cb1a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:24:26.894151 kubelet[1892]: E0208 23:24:26.894045 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"abebf737-7e5e-4139-9843-490bd08cb1a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5nhm4" podUID="abebf737-7e5e-4139-9843-490bd08cb1a3" Feb 8 23:24:27.773767 kubelet[1892]: E0208 23:24:27.773691 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:28.773893 kubelet[1892]: E0208 23:24:28.773840 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:29.331983 kubelet[1892]: I0208 23:24:29.330291 1892 topology_manager.go:215] "Topology Admit Handler" podUID="de7efcc4-c6e7-4782-a0d5-9937641777bc" podNamespace="default" podName="nginx-deployment-6d5f899847-f8947" Feb 8 23:24:29.338356 systemd[1]: Created slice kubepods-besteffort-podde7efcc4_c6e7_4782_a0d5_9937641777bc.slice. Feb 8 23:24:29.346907 kubelet[1892]: I0208 23:24:29.346886 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k68m7\" (UniqueName: \"kubernetes.io/projected/de7efcc4-c6e7-4782-a0d5-9937641777bc-kube-api-access-k68m7\") pod \"nginx-deployment-6d5f899847-f8947\" (UID: \"de7efcc4-c6e7-4782-a0d5-9937641777bc\") " pod="default/nginx-deployment-6d5f899847-f8947" Feb 8 23:24:29.644379 env[1312]: time="2024-02-08T23:24:29.644331831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-f8947,Uid:de7efcc4-c6e7-4782-a0d5-9937641777bc,Namespace:default,Attempt:0,}" Feb 8 23:24:29.774961 kubelet[1892]: E0208 23:24:29.774803 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:30.455706 env[1312]: time="2024-02-08T23:24:30.455641873Z" level=error msg="Failed to destroy network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:30.457863 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8-shm.mount: Deactivated successfully. Feb 8 23:24:30.459010 env[1312]: time="2024-02-08T23:24:30.458959499Z" level=error msg="encountered an error cleaning up failed sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:30.459157 env[1312]: time="2024-02-08T23:24:30.459034888Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-f8947,Uid:de7efcc4-c6e7-4782-a0d5-9937641777bc,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:30.459317 kubelet[1892]: E0208 23:24:30.459296 1892 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:30.459388 kubelet[1892]: E0208 23:24:30.459364 1892 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-f8947" Feb 8 23:24:30.459435 kubelet[1892]: E0208 23:24:30.459391 1892 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-f8947" Feb 8 23:24:30.459479 kubelet[1892]: E0208 23:24:30.459462 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-f8947_default(de7efcc4-c6e7-4782-a0d5-9937641777bc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-f8947_default(de7efcc4-c6e7-4782-a0d5-9937641777bc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-f8947" podUID="de7efcc4-c6e7-4782-a0d5-9937641777bc" Feb 8 23:24:30.775923 kubelet[1892]: E0208 23:24:30.775200 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:30.874501 kubelet[1892]: I0208 23:24:30.873952 1892 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:24:30.876504 env[1312]: time="2024-02-08T23:24:30.876461774Z" level=info msg="StopPodSandbox for \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\"" Feb 8 23:24:30.934545 env[1312]: time="2024-02-08T23:24:30.934495872Z" level=error msg="StopPodSandbox for \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\" failed" error="failed to destroy network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:24:30.935052 kubelet[1892]: E0208 23:24:30.934875 1892 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:24:30.935052 kubelet[1892]: E0208 23:24:30.934917 1892 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8"} Feb 8 23:24:30.935052 kubelet[1892]: E0208 23:24:30.934967 1892 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de7efcc4-c6e7-4782-a0d5-9937641777bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:24:30.935052 kubelet[1892]: E0208 23:24:30.935014 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de7efcc4-c6e7-4782-a0d5-9937641777bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-f8947" podUID="de7efcc4-c6e7-4782-a0d5-9937641777bc" Feb 8 23:24:31.775952 kubelet[1892]: E0208 23:24:31.775881 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:32.776511 kubelet[1892]: E0208 23:24:32.776444 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:33.548229 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1510971919.mount: Deactivated successfully. Feb 8 23:24:33.669536 env[1312]: time="2024-02-08T23:24:33.669485550Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:33.679732 env[1312]: time="2024-02-08T23:24:33.679692094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:33.685526 env[1312]: time="2024-02-08T23:24:33.685495224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:33.688958 env[1312]: time="2024-02-08T23:24:33.688929368Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:33.689411 env[1312]: time="2024-02-08T23:24:33.689381208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 8 23:24:33.703138 env[1312]: time="2024-02-08T23:24:33.703111084Z" level=info msg="CreateContainer within sandbox \"df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 8 23:24:33.732809 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount406878681.mount: Deactivated successfully. Feb 8 23:24:33.748834 env[1312]: time="2024-02-08T23:24:33.748784819Z" level=info msg="CreateContainer within sandbox \"df546bd5a3824535ef2c96abb484ebd85ff82c1956b28f47a830e3d4bf250a86\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e\"" Feb 8 23:24:33.749260 env[1312]: time="2024-02-08T23:24:33.749232859Z" level=info msg="StartContainer for \"bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e\"" Feb 8 23:24:33.767318 systemd[1]: Started cri-containerd-bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e.scope. Feb 8 23:24:33.777414 kubelet[1892]: E0208 23:24:33.777354 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.793146 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 8 23:24:33.793264 kernel: audit: type=1400 audit(1707434673.786:643): avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1940 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:33.825252 kernel: audit: type=1300 audit(1707434673.786:643): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1940 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:33.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316639353138643835323735316434646537313563323166373962 Feb 8 23:24:33.842868 kernel: audit: type=1327 audit(1707434673.786:643): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316639353138643835323735316434646537313563323166373962 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.870301 kernel: audit: type=1400 audit(1707434673.786:644): avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.870374 kernel: audit: type=1400 audit(1707434673.786:644): avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.870398 kernel: audit: type=1400 audit(1707434673.786:644): avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.885615 env[1312]: time="2024-02-08T23:24:33.885585752Z" level=info msg="StartContainer for \"bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e\" returns successfully" Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.908852 kernel: audit: type=1400 audit(1707434673.786:644): avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.908947 kernel: audit: type=1400 audit(1707434673.786:644): avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.922807 kernel: audit: type=1400 audit(1707434673.786:644): avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.934946 kernel: audit: type=1400 audit(1707434673.786:644): avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.786000 audit: BPF prog-id=79 op=LOAD Feb 8 23:24:33.786000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028bb90 items=0 ppid=1940 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:33.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316639353138643835323735316434646537313563323166373962 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.805000 audit: BPF prog-id=80 op=LOAD Feb 8 23:24:33.805000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028bbd8 items=0 ppid=1940 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:33.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316639353138643835323735316434646537313563323166373962 Feb 8 23:24:33.824000 audit: BPF prog-id=80 op=UNLOAD Feb 8 23:24:33.824000 audit: BPF prog-id=79 op=UNLOAD Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:33.824000 audit: BPF prog-id=81 op=LOAD Feb 8 23:24:33.824000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028bc68 items=0 ppid=1940 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:33.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316639353138643835323735316434646537313563323166373962 Feb 8 23:24:34.167094 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 8 23:24:34.167234 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 8 23:24:34.777523 kubelet[1892]: E0208 23:24:34.777467 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:34.904551 kubelet[1892]: I0208 23:24:34.904160 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-lnlx6" podStartSLOduration=4.667864485 podCreationTimestamp="2024-02-08 23:24:07 +0000 UTC" firstStartedPulling="2024-02-08 23:24:10.453412277 +0000 UTC m=+5.058537558" lastFinishedPulling="2024-02-08 23:24:33.689669669 +0000 UTC m=+28.294794950" observedRunningTime="2024-02-08 23:24:34.903071913 +0000 UTC m=+29.508197194" watchObservedRunningTime="2024-02-08 23:24:34.904121877 +0000 UTC m=+29.509247158" Feb 8 23:24:34.911172 systemd[1]: run-containerd-runc-k8s.io-bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e-runc.DaAgre.mount: Deactivated successfully. Feb 8 23:24:35.413000 audit[2612]: AVC avc: denied { write } for pid=2612 comm="tee" name="fd" dev="proc" ino=22898 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:24:35.414000 audit[2605]: AVC avc: denied { write } for pid=2605 comm="tee" name="fd" dev="proc" ino=23806 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:24:35.416000 audit[2616]: AVC avc: denied { write } for pid=2616 comm="tee" name="fd" dev="proc" ino=23809 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:24:35.417000 audit[2614]: AVC avc: denied { write } for pid=2614 comm="tee" name="fd" dev="proc" ino=22901 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:24:35.417000 audit[2614]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc498a897e a2=241 a3=1b6 items=1 ppid=2579 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.417000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 8 23:24:35.417000 audit: PATH item=0 name="/dev/fd/63" inode=22889 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:35.417000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:24:35.414000 audit[2605]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4598c96f a2=241 a3=1b6 items=1 ppid=2577 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.414000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 8 23:24:35.414000 audit: PATH item=0 name="/dev/fd/63" inode=22885 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:35.414000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:24:35.413000 audit[2612]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec7d4d980 a2=241 a3=1b6 items=1 ppid=2587 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.413000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 8 23:24:35.413000 audit: PATH item=0 name="/dev/fd/63" inode=22888 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:35.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:24:35.422000 audit[2622]: AVC avc: denied { write } for pid=2622 comm="tee" name="fd" dev="proc" ino=22909 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:24:35.422000 audit[2622]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeba1d197e a2=241 a3=1b6 items=1 ppid=2580 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.422000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 8 23:24:35.422000 audit: PATH item=0 name="/dev/fd/63" inode=22895 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:35.422000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:24:35.428000 audit[2635]: AVC avc: denied { write } for pid=2635 comm="tee" name="fd" dev="proc" ino=22916 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:24:35.428000 audit[2635]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1522697f a2=241 a3=1b6 items=1 ppid=2584 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.428000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 8 23:24:35.428000 audit: PATH item=0 name="/dev/fd/63" inode=22904 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:35.428000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:24:35.416000 audit[2616]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc67e8c97e a2=241 a3=1b6 items=1 ppid=2575 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.416000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 8 23:24:35.416000 audit: PATH item=0 name="/dev/fd/63" inode=22892 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:35.416000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:24:35.445000 audit[2644]: AVC avc: denied { write } for pid=2644 comm="tee" name="fd" dev="proc" ino=23834 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:24:35.445000 audit[2644]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc003596e a2=241 a3=1b6 items=1 ppid=2583 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.445000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 8 23:24:35.445000 audit: PATH item=0 name="/dev/fd/63" inode=23821 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:35.445000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:24:35.666011 kernel: Initializing XFRM netlink socket Feb 8 23:24:35.778258 kubelet[1892]: E0208 23:24:35.778155 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit: BPF prog-id=82 op=LOAD Feb 8 23:24:35.793000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff4fdb96f0 a2=70 a3=7ff894f14000 items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:24:35.793000 audit: BPF prog-id=82 op=UNLOAD Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit: BPF prog-id=83 op=LOAD Feb 8 23:24:35.793000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff4fdb96f0 a2=70 a3=6e items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:24:35.793000 audit: BPF prog-id=83 op=UNLOAD Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff4fdb96a0 a2=70 a3=7fff4fdb96f0 items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit: BPF prog-id=84 op=LOAD Feb 8 23:24:35.793000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff4fdb9680 a2=70 a3=7fff4fdb96f0 items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:24:35.793000 audit: BPF prog-id=84 op=UNLOAD Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff4fdb9760 a2=70 a3=0 items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff4fdb9750 a2=70 a3=0 items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:24:35.793000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.793000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff4fdb9790 a2=70 a3=0 items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.794000 audit: BPF prog-id=85 op=LOAD Feb 8 23:24:35.794000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff4fdb96b0 a2=70 a3=ffffffff items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.794000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:24:35.799000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.799000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbbbb2740 a2=70 a3=fff80800 items=0 ppid=2581 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.799000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 8 23:24:35.799000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:35.799000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbbbb2610 a2=70 a3=3 items=0 ppid=2581 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.799000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 8 23:24:35.810000 audit: BPF prog-id=85 op=UNLOAD Feb 8 23:24:35.900000 audit[2741]: NETFILTER_CFG table=mangle:68 family=2 entries=19 op=nft_register_chain pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:35.900000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe2acf2cf0 a2=0 a3=7ffe2acf2cdc items=0 ppid=2581 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.900000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:35.916759 systemd[1]: run-containerd-runc-k8s.io-bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e-runc.Rj4KJW.mount: Deactivated successfully. Feb 8 23:24:35.922000 audit[2738]: NETFILTER_CFG table=raw:69 family=2 entries=19 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:35.922000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffdb0092600 a2=0 a3=55de96736000 items=0 ppid=2581 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.922000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:35.923000 audit[2739]: NETFILTER_CFG table=nat:70 family=2 entries=16 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:35.923000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc47ee4000 a2=0 a3=560c173b9000 items=0 ppid=2581 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.923000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:35.930000 audit[2755]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:35.930000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff6b2a7230 a2=0 a3=55c037d20000 items=0 ppid=2581 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:35.930000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:36.735852 systemd-networkd[1454]: vxlan.calico: Link UP Feb 8 23:24:36.735862 systemd-networkd[1454]: vxlan.calico: Gained carrier Feb 8 23:24:36.778398 kubelet[1892]: E0208 23:24:36.778340 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:37.779489 kubelet[1892]: E0208 23:24:37.779401 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:37.810088 env[1312]: time="2024-02-08T23:24:37.810031481Z" level=info msg="StopPodSandbox for \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\"" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.849 [INFO][2790] k8s.go 578: Cleaning up netns ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.850 [INFO][2790] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" iface="eth0" netns="/var/run/netns/cni-7f52ff12-993e-b803-86d4-025f89e647d4" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.850 [INFO][2790] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" iface="eth0" netns="/var/run/netns/cni-7f52ff12-993e-b803-86d4-025f89e647d4" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.850 [INFO][2790] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" iface="eth0" netns="/var/run/netns/cni-7f52ff12-993e-b803-86d4-025f89e647d4" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.850 [INFO][2790] k8s.go 585: Releasing IP address(es) ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.850 [INFO][2790] utils.go 188: Calico CNI releasing IP address ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.868 [INFO][2796] ipam_plugin.go 415: Releasing address using handleID ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.868 [INFO][2796] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.868 [INFO][2796] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.875 [WARNING][2796] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.875 [INFO][2796] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.877 [INFO][2796] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:24:37.878916 env[1312]: 2024-02-08 23:24:37.878 [INFO][2790] k8s.go 591: Teardown processing complete. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:24:37.881542 systemd[1]: run-netns-cni\x2d7f52ff12\x2d993e\x2db803\x2d86d4\x2d025f89e647d4.mount: Deactivated successfully. Feb 8 23:24:37.882498 env[1312]: time="2024-02-08T23:24:37.882453650Z" level=info msg="TearDown network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\" successfully" Feb 8 23:24:37.882601 env[1312]: time="2024-02-08T23:24:37.882495145Z" level=info msg="StopPodSandbox for \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\" returns successfully" Feb 8 23:24:37.883307 env[1312]: time="2024-02-08T23:24:37.883276251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5nhm4,Uid:abebf737-7e5e-4139-9843-490bd08cb1a3,Namespace:calico-system,Attempt:1,}" Feb 8 23:24:38.026360 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:24:38.026461 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid2beaaf3def: link becomes ready Feb 8 23:24:38.018673 systemd-networkd[1454]: calid2beaaf3def: Link UP Feb 8 23:24:38.027170 systemd-networkd[1454]: calid2beaaf3def: Gained carrier Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.959 [INFO][2803] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.31-k8s-csi--node--driver--5nhm4-eth0 csi-node-driver- calico-system abebf737-7e5e-4139-9843-490bd08cb1a3 1246 0 2024-02-08 23:24:07 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.31 csi-node-driver-5nhm4 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calid2beaaf3def [] []}} ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Namespace="calico-system" Pod="csi-node-driver-5nhm4" WorkloadEndpoint="10.200.8.31-k8s-csi--node--driver--5nhm4-" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.959 [INFO][2803] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Namespace="calico-system" Pod="csi-node-driver-5nhm4" WorkloadEndpoint="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.981 [INFO][2815] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" HandleID="k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.992 [INFO][2815] ipam_plugin.go 268: Auto assigning IP ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" HandleID="k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00022ecf0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.31", "pod":"csi-node-driver-5nhm4", "timestamp":"2024-02-08 23:24:37.981548402 +0000 UTC"}, Hostname:"10.200.8.31", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.992 [INFO][2815] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.992 [INFO][2815] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.992 [INFO][2815] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.31' Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.994 [INFO][2815] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:37.997 [INFO][2815] ipam.go 372: Looking up existing affinities for host host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.001 [INFO][2815] ipam.go 489: Trying affinity for 192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.002 [INFO][2815] ipam.go 155: Attempting to load block cidr=192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.004 [INFO][2815] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.004 [INFO][2815] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.64/26 handle="k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.006 [INFO][2815] ipam.go 1682: Creating new handle: k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341 Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.009 [INFO][2815] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.64/26 handle="k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.012 [INFO][2815] ipam.go 1216: Successfully claimed IPs: [192.168.67.65/26] block=192.168.67.64/26 handle="k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.012 [INFO][2815] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.65/26] handle="k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" host="10.200.8.31" Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.012 [INFO][2815] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:24:38.049330 env[1312]: 2024-02-08 23:24:38.012 [INFO][2815] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.65/26] IPv6=[] ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" HandleID="k8s-pod-network.0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:38.050201 env[1312]: 2024-02-08 23:24:38.014 [INFO][2803] k8s.go 385: Populated endpoint ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Namespace="calico-system" Pod="csi-node-driver-5nhm4" WorkloadEndpoint="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-csi--node--driver--5nhm4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"abebf737-7e5e-4139-9843-490bd08cb1a3", ResourceVersion:"1246", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"", Pod:"csi-node-driver-5nhm4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid2beaaf3def", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:24:38.050201 env[1312]: 2024-02-08 23:24:38.015 [INFO][2803] k8s.go 386: Calico CNI using IPs: [192.168.67.65/32] ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Namespace="calico-system" Pod="csi-node-driver-5nhm4" WorkloadEndpoint="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:38.050201 env[1312]: 2024-02-08 23:24:38.015 [INFO][2803] dataplane_linux.go 68: Setting the host side veth name to calid2beaaf3def ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Namespace="calico-system" Pod="csi-node-driver-5nhm4" WorkloadEndpoint="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:38.050201 env[1312]: 2024-02-08 23:24:38.028 [INFO][2803] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Namespace="calico-system" Pod="csi-node-driver-5nhm4" WorkloadEndpoint="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:38.050201 env[1312]: 2024-02-08 23:24:38.028 [INFO][2803] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Namespace="calico-system" Pod="csi-node-driver-5nhm4" WorkloadEndpoint="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-csi--node--driver--5nhm4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"abebf737-7e5e-4139-9843-490bd08cb1a3", ResourceVersion:"1246", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341", Pod:"csi-node-driver-5nhm4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid2beaaf3def", MAC:"ca:6e:f2:1f:97:f6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:24:38.050201 env[1312]: 2024-02-08 23:24:38.040 [INFO][2803] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341" Namespace="calico-system" Pod="csi-node-driver-5nhm4" WorkloadEndpoint="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:24:38.060000 audit[2837]: NETFILTER_CFG table=filter:72 family=2 entries=36 op=nft_register_chain pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:38.060000 audit[2837]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffdf20ed6a0 a2=0 a3=7ffdf20ed68c items=0 ppid=2581 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:38.060000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:38.071934 env[1312]: time="2024-02-08T23:24:38.071867413Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:24:38.071934 env[1312]: time="2024-02-08T23:24:38.071902709Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:24:38.071934 env[1312]: time="2024-02-08T23:24:38.071916108Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:24:38.072280 env[1312]: time="2024-02-08T23:24:38.072235270Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341 pid=2847 runtime=io.containerd.runc.v2 Feb 8 23:24:38.089887 systemd[1]: Started cri-containerd-0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341.scope. Feb 8 23:24:38.095168 systemd-networkd[1454]: vxlan.calico: Gained IPv6LL Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit: BPF prog-id=86 op=LOAD Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2847 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:38.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353666343238303035633265326633616231396337316165376437 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2847 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:38.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353666343238303035633265326633616231396337316165376437 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit: BPF prog-id=87 op=LOAD Feb 8 23:24:38.100000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3830 items=0 ppid=2847 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:38.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353666343238303035633265326633616231396337316165376437 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit: BPF prog-id=88 op=LOAD Feb 8 23:24:38.100000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3878 items=0 ppid=2847 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:38.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353666343238303035633265326633616231396337316165376437 Feb 8 23:24:38.100000 audit: BPF prog-id=88 op=UNLOAD Feb 8 23:24:38.100000 audit: BPF prog-id=87 op=UNLOAD Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:38.100000 audit: BPF prog-id=89 op=LOAD Feb 8 23:24:38.100000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e3c88 items=0 ppid=2847 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:38.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353666343238303035633265326633616231396337316165376437 Feb 8 23:24:38.113659 env[1312]: time="2024-02-08T23:24:38.113622597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5nhm4,Uid:abebf737-7e5e-4139-9843-490bd08cb1a3,Namespace:calico-system,Attempt:1,} returns sandbox id \"0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341\"" Feb 8 23:24:38.115156 env[1312]: time="2024-02-08T23:24:38.115110522Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 8 23:24:38.780442 kubelet[1892]: E0208 23:24:38.780390 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:39.119129 systemd-networkd[1454]: calid2beaaf3def: Gained IPv6LL Feb 8 23:24:39.781058 kubelet[1892]: E0208 23:24:39.781022 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:39.998429 systemd[1]: run-containerd-runc-k8s.io-bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e-runc.wgaLiW.mount: Deactivated successfully. Feb 8 23:24:40.124955 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount108032613.mount: Deactivated successfully. Feb 8 23:24:40.705263 env[1312]: time="2024-02-08T23:24:40.705208889Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:40.711352 env[1312]: time="2024-02-08T23:24:40.711299905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:40.718823 env[1312]: time="2024-02-08T23:24:40.718783864Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:40.722751 env[1312]: time="2024-02-08T23:24:40.722722921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:40.723353 env[1312]: time="2024-02-08T23:24:40.723322854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 8 23:24:40.725627 env[1312]: time="2024-02-08T23:24:40.725597198Z" level=info msg="CreateContainer within sandbox \"0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 8 23:24:40.762185 env[1312]: time="2024-02-08T23:24:40.762140293Z" level=info msg="CreateContainer within sandbox \"0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7a89e9520f2e15f59e529d2d93b86b4b925eb6c1978947d311403dbd8c431a2c\"" Feb 8 23:24:40.762816 env[1312]: time="2024-02-08T23:24:40.762785120Z" level=info msg="StartContainer for \"7a89e9520f2e15f59e529d2d93b86b4b925eb6c1978947d311403dbd8c431a2c\"" Feb 8 23:24:40.778697 systemd[1]: Started cri-containerd-7a89e9520f2e15f59e529d2d93b86b4b925eb6c1978947d311403dbd8c431a2c.scope. Feb 8 23:24:40.781411 kubelet[1892]: E0208 23:24:40.781353 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:40.813364 kernel: kauditd_printk_skb: 211 callbacks suppressed Feb 8 23:24:40.813586 kernel: audit: type=1400 audit(1707434680.795:693): avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0002156b0 a2=3c a3=8 items=0 ppid=2847 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:40.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383965393532306632653135663539653532396432643933623836 Feb 8 23:24:40.847575 kernel: audit: type=1300 audit(1707434680.795:693): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0002156b0 a2=3c a3=8 items=0 ppid=2847 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:40.847693 kernel: audit: type=1327 audit(1707434680.795:693): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383965393532306632653135663539653532396432643933623836 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.860947 kernel: audit: type=1400 audit(1707434680.795:694): avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.865191 kernel: audit: type=1400 audit(1707434680.795:694): avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.866187 env[1312]: time="2024-02-08T23:24:40.866150307Z" level=info msg="StartContainer for \"7a89e9520f2e15f59e529d2d93b86b4b925eb6c1978947d311403dbd8c431a2c\" returns successfully" Feb 8 23:24:40.867663 env[1312]: time="2024-02-08T23:24:40.867570447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.882848 kernel: audit: type=1400 audit(1707434680.795:694): avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.882917 kernel: audit: type=1400 audit(1707434680.795:694): avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.893792 kernel: audit: type=1400 audit(1707434680.795:694): avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.917498 kernel: audit: type=1400 audit(1707434680.795:694): avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.917569 kernel: audit: type=1400 audit(1707434680.795:694): avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.795000 audit: BPF prog-id=90 op=LOAD Feb 8 23:24:40.795000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0002159d8 a2=78 a3=c00017fc70 items=0 ppid=2847 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:40.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383965393532306632653135663539653532396432643933623836 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit: BPF prog-id=91 op=LOAD Feb 8 23:24:40.813000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000215770 a2=78 a3=c00017fcb8 items=0 ppid=2847 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:40.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383965393532306632653135663539653532396432643933623836 Feb 8 23:24:40.813000 audit: BPF prog-id=91 op=UNLOAD Feb 8 23:24:40.813000 audit: BPF prog-id=90 op=UNLOAD Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:40.813000 audit: BPF prog-id=92 op=LOAD Feb 8 23:24:40.813000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000215c30 a2=78 a3=c00017fd48 items=0 ppid=2847 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:40.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383965393532306632653135663539653532396432643933623836 Feb 8 23:24:41.781791 kubelet[1892]: E0208 23:24:41.781733 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:41.809786 env[1312]: time="2024-02-08T23:24:41.809342492Z" level=info msg="StopPodSandbox for \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\"" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.846 [INFO][2960] k8s.go 578: Cleaning up netns ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.847 [INFO][2960] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" iface="eth0" netns="/var/run/netns/cni-d0660892-c40a-9066-fcef-e5b98b2a5c39" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.847 [INFO][2960] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" iface="eth0" netns="/var/run/netns/cni-d0660892-c40a-9066-fcef-e5b98b2a5c39" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.847 [INFO][2960] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" iface="eth0" netns="/var/run/netns/cni-d0660892-c40a-9066-fcef-e5b98b2a5c39" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.847 [INFO][2960] k8s.go 585: Releasing IP address(es) ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.847 [INFO][2960] utils.go 188: Calico CNI releasing IP address ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.866 [INFO][2966] ipam_plugin.go 415: Releasing address using handleID ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.866 [INFO][2966] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.866 [INFO][2966] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.873 [WARNING][2966] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.873 [INFO][2966] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.875 [INFO][2966] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:24:41.876970 env[1312]: 2024-02-08 23:24:41.876 [INFO][2960] k8s.go 591: Teardown processing complete. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:24:41.879660 systemd[1]: run-netns-cni\x2dd0660892\x2dc40a\x2d9066\x2dfcef\x2de5b98b2a5c39.mount: Deactivated successfully. Feb 8 23:24:41.880647 env[1312]: time="2024-02-08T23:24:41.880597969Z" level=info msg="TearDown network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\" successfully" Feb 8 23:24:41.880647 env[1312]: time="2024-02-08T23:24:41.880638364Z" level=info msg="StopPodSandbox for \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\" returns successfully" Feb 8 23:24:41.881409 env[1312]: time="2024-02-08T23:24:41.881378583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-f8947,Uid:de7efcc4-c6e7-4782-a0d5-9937641777bc,Namespace:default,Attempt:1,}" Feb 8 23:24:42.036945 systemd-networkd[1454]: calieab37d84959: Link UP Feb 8 23:24:42.044613 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:24:42.044664 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieab37d84959: link becomes ready Feb 8 23:24:42.045183 systemd-networkd[1454]: calieab37d84959: Gained carrier Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:41.973 [INFO][2972] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0 nginx-deployment-6d5f899847- default de7efcc4-c6e7-4782-a0d5-9937641777bc 1268 0 2024-02-08 23:24:29 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.31 nginx-deployment-6d5f899847-f8947 eth0 default [] [] [kns.default ksa.default.default] calieab37d84959 [] []}} ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Namespace="default" Pod="nginx-deployment-6d5f899847-f8947" WorkloadEndpoint="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:41.973 [INFO][2972] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Namespace="default" Pod="nginx-deployment-6d5f899847-f8947" WorkloadEndpoint="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:41.996 [INFO][2984] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" HandleID="k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.008 [INFO][2984] ipam_plugin.go 268: Auto assigning IP ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" HandleID="k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1b80), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.31", "pod":"nginx-deployment-6d5f899847-f8947", "timestamp":"2024-02-08 23:24:41.996292867 +0000 UTC"}, Hostname:"10.200.8.31", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.008 [INFO][2984] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.008 [INFO][2984] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.008 [INFO][2984] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.31' Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.010 [INFO][2984] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.013 [INFO][2984] ipam.go 372: Looking up existing affinities for host host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.017 [INFO][2984] ipam.go 489: Trying affinity for 192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.019 [INFO][2984] ipam.go 155: Attempting to load block cidr=192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.020 [INFO][2984] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.020 [INFO][2984] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.64/26 handle="k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.022 [INFO][2984] ipam.go 1682: Creating new handle: k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.026 [INFO][2984] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.64/26 handle="k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.030 [INFO][2984] ipam.go 1216: Successfully claimed IPs: [192.168.67.66/26] block=192.168.67.64/26 handle="k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.030 [INFO][2984] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.66/26] handle="k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" host="10.200.8.31" Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.030 [INFO][2984] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:24:42.052451 env[1312]: 2024-02-08 23:24:42.031 [INFO][2984] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.66/26] IPv6=[] ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" HandleID="k8s-pod-network.583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:42.053337 env[1312]: 2024-02-08 23:24:42.032 [INFO][2972] k8s.go 385: Populated endpoint ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Namespace="default" Pod="nginx-deployment-6d5f899847-f8947" WorkloadEndpoint="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"de7efcc4-c6e7-4782-a0d5-9937641777bc", ResourceVersion:"1268", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"", Pod:"nginx-deployment-6d5f899847-f8947", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieab37d84959", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:24:42.053337 env[1312]: 2024-02-08 23:24:42.032 [INFO][2972] k8s.go 386: Calico CNI using IPs: [192.168.67.66/32] ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Namespace="default" Pod="nginx-deployment-6d5f899847-f8947" WorkloadEndpoint="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:42.053337 env[1312]: 2024-02-08 23:24:42.032 [INFO][2972] dataplane_linux.go 68: Setting the host side veth name to calieab37d84959 ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Namespace="default" Pod="nginx-deployment-6d5f899847-f8947" WorkloadEndpoint="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:42.053337 env[1312]: 2024-02-08 23:24:42.045 [INFO][2972] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Namespace="default" Pod="nginx-deployment-6d5f899847-f8947" WorkloadEndpoint="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:42.053337 env[1312]: 2024-02-08 23:24:42.046 [INFO][2972] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Namespace="default" Pod="nginx-deployment-6d5f899847-f8947" WorkloadEndpoint="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"de7efcc4-c6e7-4782-a0d5-9937641777bc", ResourceVersion:"1268", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a", Pod:"nginx-deployment-6d5f899847-f8947", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieab37d84959", MAC:"5a:d8:2a:78:24:8c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:24:42.053337 env[1312]: 2024-02-08 23:24:42.051 [INFO][2972] k8s.go 491: Wrote updated endpoint to datastore ContainerID="583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a" Namespace="default" Pod="nginx-deployment-6d5f899847-f8947" WorkloadEndpoint="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:24:42.080000 audit[3008]: NETFILTER_CFG table=filter:73 family=2 entries=40 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:42.080000 audit[3008]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7fff9eb18e80 a2=0 a3=7fff9eb18e6c items=0 ppid=2581 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:42.080000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:42.089047 env[1312]: time="2024-02-08T23:24:42.088991609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:24:42.089480 env[1312]: time="2024-02-08T23:24:42.089031904Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:24:42.089480 env[1312]: time="2024-02-08T23:24:42.089051802Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:24:42.089480 env[1312]: time="2024-02-08T23:24:42.089228183Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a pid=3016 runtime=io.containerd.runc.v2 Feb 8 23:24:42.113248 systemd[1]: run-containerd-runc-k8s.io-583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a-runc.c3tx9N.mount: Deactivated successfully. Feb 8 23:24:42.119205 systemd[1]: Started cri-containerd-583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a.scope. Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.128000 audit: BPF prog-id=93 op=LOAD Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3016 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:42.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538336235333535336431663033636363643338323630633938383665 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=3016 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:42.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538336235333535336431663033636363643338323630633938383665 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit: BPF prog-id=94 op=LOAD Feb 8 23:24:42.129000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00030a340 items=0 ppid=3016 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:42.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538336235333535336431663033636363643338323630633938383665 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit: BPF prog-id=95 op=LOAD Feb 8 23:24:42.129000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00030a388 items=0 ppid=3016 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:42.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538336235333535336431663033636363643338323630633938383665 Feb 8 23:24:42.129000 audit: BPF prog-id=95 op=UNLOAD Feb 8 23:24:42.129000 audit: BPF prog-id=94 op=UNLOAD Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:42.129000 audit: BPF prog-id=96 op=LOAD Feb 8 23:24:42.129000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00030a798 items=0 ppid=3016 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:42.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538336235333535336431663033636363643338323630633938383665 Feb 8 23:24:42.160482 env[1312]: time="2024-02-08T23:24:42.160440942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-f8947,Uid:de7efcc4-c6e7-4782-a0d5-9937641777bc,Namespace:default,Attempt:1,} returns sandbox id \"583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a\"" Feb 8 23:24:42.782131 kubelet[1892]: E0208 23:24:42.782070 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:43.382591 env[1312]: time="2024-02-08T23:24:43.382531427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:43.387744 env[1312]: time="2024-02-08T23:24:43.387706484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:43.393076 env[1312]: time="2024-02-08T23:24:43.393046424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:43.399190 env[1312]: time="2024-02-08T23:24:43.399156283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:43.399654 env[1312]: time="2024-02-08T23:24:43.399624834Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 8 23:24:43.400952 env[1312]: time="2024-02-08T23:24:43.400924298Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 8 23:24:43.401913 env[1312]: time="2024-02-08T23:24:43.401885597Z" level=info msg="CreateContainer within sandbox \"0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 8 23:24:43.491441 env[1312]: time="2024-02-08T23:24:43.491404807Z" level=info msg="CreateContainer within sandbox \"0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fa893f901dd57aed05876ea12cec8f4b0d622f55fb80b5485ec0be9d488bfe76\"" Feb 8 23:24:43.491863 env[1312]: time="2024-02-08T23:24:43.491824763Z" level=info msg="StartContainer for \"fa893f901dd57aed05876ea12cec8f4b0d622f55fb80b5485ec0be9d488bfe76\"" Feb 8 23:24:43.521082 systemd[1]: Started cri-containerd-fa893f901dd57aed05876ea12cec8f4b0d622f55fb80b5485ec0be9d488bfe76.scope. Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2847 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:43.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383933663930316464353761656430353837366561313263656338 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit: BPF prog-id=97 op=LOAD Feb 8 23:24:43.531000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00032e460 items=0 ppid=2847 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:43.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383933663930316464353761656430353837366561313263656338 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.531000 audit: BPF prog-id=98 op=LOAD Feb 8 23:24:43.531000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00032e4a8 items=0 ppid=2847 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:43.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383933663930316464353761656430353837366561313263656338 Feb 8 23:24:43.531000 audit: BPF prog-id=98 op=UNLOAD Feb 8 23:24:43.532000 audit: BPF prog-id=97 op=UNLOAD Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:43.533000 audit: BPF prog-id=99 op=LOAD Feb 8 23:24:43.533000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00032e538 items=0 ppid=2847 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:43.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383933663930316464353761656430353837366561313263656338 Feb 8 23:24:43.550461 env[1312]: time="2024-02-08T23:24:43.550424516Z" level=info msg="StartContainer for \"fa893f901dd57aed05876ea12cec8f4b0d622f55fb80b5485ec0be9d488bfe76\" returns successfully" Feb 8 23:24:43.783232 kubelet[1892]: E0208 23:24:43.783090 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:43.855247 systemd-networkd[1454]: calieab37d84959: Gained IPv6LL Feb 8 23:24:43.864516 kubelet[1892]: I0208 23:24:43.864463 1892 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 8 23:24:43.864516 kubelet[1892]: I0208 23:24:43.864500 1892 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 8 23:24:43.932067 kubelet[1892]: I0208 23:24:43.932035 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5nhm4" podStartSLOduration=31.646690568 podCreationTimestamp="2024-02-08 23:24:07 +0000 UTC" firstStartedPulling="2024-02-08 23:24:38.114772262 +0000 UTC m=+32.719897543" lastFinishedPulling="2024-02-08 23:24:43.400087385 +0000 UTC m=+38.005212766" observedRunningTime="2024-02-08 23:24:43.931677326 +0000 UTC m=+38.536802707" watchObservedRunningTime="2024-02-08 23:24:43.932005791 +0000 UTC m=+38.537131072" Feb 8 23:24:44.783486 kubelet[1892]: E0208 23:24:44.783425 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:45.759141 kubelet[1892]: E0208 23:24:45.759065 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:45.783754 kubelet[1892]: E0208 23:24:45.783656 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:46.784133 kubelet[1892]: E0208 23:24:46.784091 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:47.006047 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1113029990.mount: Deactivated successfully. Feb 8 23:24:47.784541 kubelet[1892]: E0208 23:24:47.784496 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:47.928756 env[1312]: time="2024-02-08T23:24:47.928710731Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:47.936549 env[1312]: time="2024-02-08T23:24:47.936445889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:47.940863 env[1312]: time="2024-02-08T23:24:47.940820069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:47.944731 env[1312]: time="2024-02-08T23:24:47.944701396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:47.945397 env[1312]: time="2024-02-08T23:24:47.945369632Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 8 23:24:47.947576 env[1312]: time="2024-02-08T23:24:47.947546623Z" level=info msg="CreateContainer within sandbox \"583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 8 23:24:47.980783 env[1312]: time="2024-02-08T23:24:47.980747536Z" level=info msg="CreateContainer within sandbox \"583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f054800d74c14bb0a2a2624a3eaf6cf67054553c622a4e0b8c579b5260e571fd\"" Feb 8 23:24:47.981331 env[1312]: time="2024-02-08T23:24:47.981277186Z" level=info msg="StartContainer for \"f054800d74c14bb0a2a2624a3eaf6cf67054553c622a4e0b8c579b5260e571fd\"" Feb 8 23:24:48.011096 systemd[1]: Started cri-containerd-f054800d74c14bb0a2a2624a3eaf6cf67054553c622a4e0b8c579b5260e571fd.scope. Feb 8 23:24:48.016699 systemd[1]: run-containerd-runc-k8s.io-f054800d74c14bb0a2a2624a3eaf6cf67054553c622a4e0b8c579b5260e571fd-runc.edF8fZ.mount: Deactivated successfully. Feb 8 23:24:48.036725 kernel: kauditd_printk_skb: 136 callbacks suppressed Feb 8 23:24:48.036795 kernel: audit: type=1400 audit(1707434688.031:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.061053 kernel: audit: type=1400 audit(1707434688.031:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073527 kernel: audit: type=1400 audit(1707434688.031:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.086342 kernel: audit: type=1400 audit(1707434688.031:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.109632 kernel: audit: type=1400 audit(1707434688.031:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.109815 kernel: audit: type=1400 audit(1707434688.031:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.109887 kernel: audit: type=1400 audit(1707434688.031:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.129306 env[1312]: time="2024-02-08T23:24:48.129273444Z" level=info msg="StartContainer for \"f054800d74c14bb0a2a2624a3eaf6cf67054553c622a4e0b8c579b5260e571fd\" returns successfully" Feb 8 23:24:48.134596 kernel: audit: type=1400 audit(1707434688.031:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.134677 kernel: audit: type=1400 audit(1707434688.031:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.159569 kernel: audit: type=1400 audit(1707434688.036:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit: BPF prog-id=100 op=LOAD Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3016 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:48.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353438303064373463313462623061326132363234613365616636 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3016 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:48.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353438303064373463313462623061326132363234613365616636 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.036000 audit: BPF prog-id=101 op=LOAD Feb 8 23:24:48.036000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00028a410 items=0 ppid=3016 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:48.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353438303064373463313462623061326132363234613365616636 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.048000 audit: BPF prog-id=102 op=LOAD Feb 8 23:24:48.048000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00028a458 items=0 ppid=3016 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:48.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353438303064373463313462623061326132363234613365616636 Feb 8 23:24:48.073000 audit: BPF prog-id=102 op=UNLOAD Feb 8 23:24:48.073000 audit: BPF prog-id=101 op=UNLOAD Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:48.073000 audit: BPF prog-id=103 op=LOAD Feb 8 23:24:48.073000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00028a868 items=0 ppid=3016 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:48.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353438303064373463313462623061326132363234613365616636 Feb 8 23:24:48.785425 kubelet[1892]: E0208 23:24:48.785368 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:48.937800 kubelet[1892]: I0208 23:24:48.937768 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-f8947" podStartSLOduration=14.153663721 podCreationTimestamp="2024-02-08 23:24:29 +0000 UTC" firstStartedPulling="2024-02-08 23:24:42.161544824 +0000 UTC m=+36.766670105" lastFinishedPulling="2024-02-08 23:24:47.945617108 +0000 UTC m=+42.550742489" observedRunningTime="2024-02-08 23:24:48.937492128 +0000 UTC m=+43.542617509" watchObservedRunningTime="2024-02-08 23:24:48.937736105 +0000 UTC m=+43.542861486" Feb 8 23:24:49.785721 kubelet[1892]: E0208 23:24:49.785637 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:50.786563 kubelet[1892]: E0208 23:24:50.786492 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:51.787332 kubelet[1892]: E0208 23:24:51.787262 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:52.788253 kubelet[1892]: E0208 23:24:52.788169 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:52.816000 audit[3160]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.816000 audit[3160]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffed87c7100 a2=0 a3=7ffed87c70ec items=0 ppid=2037 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.817000 audit[3160]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.817000 audit[3160]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffed87c7100 a2=0 a3=31030 items=0 ppid=2037 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.817000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.827000 audit[3164]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.827000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe6cfceaa0 a2=0 a3=7ffe6cfcea8c items=0 ppid=2037 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.828000 audit[3164]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.828000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffe6cfceaa0 a2=0 a3=31030 items=0 ppid=2037 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.828000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.857119 kubelet[1892]: I0208 23:24:52.857090 1892 topology_manager.go:215] "Topology Admit Handler" podUID="05dc16fd-7955-413e-b7be-b337a95c87aa" podNamespace="default" podName="nfs-server-provisioner-0" Feb 8 23:24:52.862277 systemd[1]: Created slice kubepods-besteffort-pod05dc16fd_7955_413e_b7be_b337a95c87aa.slice. Feb 8 23:24:53.004822 kubelet[1892]: I0208 23:24:53.004745 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/05dc16fd-7955-413e-b7be-b337a95c87aa-data\") pod \"nfs-server-provisioner-0\" (UID: \"05dc16fd-7955-413e-b7be-b337a95c87aa\") " pod="default/nfs-server-provisioner-0" Feb 8 23:24:53.005307 kubelet[1892]: I0208 23:24:53.005273 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gb5pz\" (UniqueName: \"kubernetes.io/projected/05dc16fd-7955-413e-b7be-b337a95c87aa-kube-api-access-gb5pz\") pod \"nfs-server-provisioner-0\" (UID: \"05dc16fd-7955-413e-b7be-b337a95c87aa\") " pod="default/nfs-server-provisioner-0" Feb 8 23:24:53.165487 env[1312]: time="2024-02-08T23:24:53.165434493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:05dc16fd-7955-413e-b7be-b337a95c87aa,Namespace:default,Attempt:0,}" Feb 8 23:24:53.317504 systemd-networkd[1454]: cali60e51b789ff: Link UP Feb 8 23:24:53.328252 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:24:53.328342 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 8 23:24:53.328811 systemd-networkd[1454]: cali60e51b789ff: Gained carrier Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.243 [INFO][3167] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.31-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 05dc16fd-7955-413e-b7be-b337a95c87aa 1329 0 2024-02-08 23:24:52 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.31 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.31-k8s-nfs--server--provisioner--0-" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.243 [INFO][3167] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.267 [INFO][3178] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" HandleID="k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Workload="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.278 [INFO][3178] ipam_plugin.go 268: Auto assigning IP ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" HandleID="k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Workload="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027dae0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.31", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-08 23:24:53.267484462 +0000 UTC"}, Hostname:"10.200.8.31", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.278 [INFO][3178] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.278 [INFO][3178] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.278 [INFO][3178] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.31' Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.280 [INFO][3178] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.287 [INFO][3178] ipam.go 372: Looking up existing affinities for host host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.292 [INFO][3178] ipam.go 489: Trying affinity for 192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.293 [INFO][3178] ipam.go 155: Attempting to load block cidr=192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.295 [INFO][3178] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.64/26 host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.295 [INFO][3178] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.64/26 handle="k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.297 [INFO][3178] ipam.go 1682: Creating new handle: k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7 Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.300 [INFO][3178] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.64/26 handle="k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.304 [INFO][3178] ipam.go 1216: Successfully claimed IPs: [192.168.67.67/26] block=192.168.67.64/26 handle="k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.304 [INFO][3178] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.67/26] handle="k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" host="10.200.8.31" Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.304 [INFO][3178] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:24:53.336434 env[1312]: 2024-02-08 23:24:53.304 [INFO][3178] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.67/26] IPv6=[] ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" HandleID="k8s-pod-network.3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Workload="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:24:53.337248 env[1312]: 2024-02-08 23:24:53.305 [INFO][3167] k8s.go 385: Populated endpoint ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"05dc16fd-7955-413e-b7be-b337a95c87aa", ResourceVersion:"1329", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.67.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:24:53.337248 env[1312]: 2024-02-08 23:24:53.306 [INFO][3167] k8s.go 386: Calico CNI using IPs: [192.168.67.67/32] ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:24:53.337248 env[1312]: 2024-02-08 23:24:53.306 [INFO][3167] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:24:53.337248 env[1312]: 2024-02-08 23:24:53.329 [INFO][3167] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:24:53.337493 env[1312]: 2024-02-08 23:24:53.329 [INFO][3167] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"05dc16fd-7955-413e-b7be-b337a95c87aa", ResourceVersion:"1329", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.67.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"b6:2a:64:73:84:36", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:24:53.337493 env[1312]: 2024-02-08 23:24:53.335 [INFO][3167] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.31-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:24:53.356000 audit[3205]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:53.362747 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 8 23:24:53.362815 kernel: audit: type=1325 audit(1707434693.356:746): table=filter:78 family=2 entries=38 op=nft_register_chain pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:53.363873 env[1312]: time="2024-02-08T23:24:53.358188691Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:24:53.363873 env[1312]: time="2024-02-08T23:24:53.358233087Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:24:53.363873 env[1312]: time="2024-02-08T23:24:53.358249085Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:24:53.363873 env[1312]: time="2024-02-08T23:24:53.358385674Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7 pid=3209 runtime=io.containerd.runc.v2 Feb 8 23:24:53.356000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffea40d71f0 a2=0 a3=7ffea40d71dc items=0 ppid=2581 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:53.405294 kernel: audit: type=1300 audit(1707434693.356:746): arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffea40d71f0 a2=0 a3=7ffea40d71dc items=0 ppid=2581 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:53.405377 kernel: audit: type=1327 audit(1707434693.356:746): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:53.356000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:53.400088 systemd[1]: Started cri-containerd-3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7.scope. Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.436733 kernel: audit: type=1400 audit(1707434693.419:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.460895 kernel: audit: type=1400 audit(1707434693.419:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.460965 kernel: audit: type=1400 audit(1707434693.419:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.473463 kernel: audit: type=1400 audit(1707434693.419:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.473550 kernel: audit: type=1400 audit(1707434693.419:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.497394 kernel: audit: type=1400 audit(1707434693.419:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.508421 kernel: audit: type=1400 audit(1707434693.419:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit: BPF prog-id=104 op=LOAD Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3209 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:53.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339363365366462616538346434396233306361383838306630386565 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3209 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:53.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339363365366462616538346434396233306361383838306630386565 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.459000 audit: BPF prog-id=105 op=LOAD Feb 8 23:24:53.459000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000388340 items=0 ppid=3209 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:53.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339363365366462616538346434396233306361383838306630386565 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.483000 audit: BPF prog-id=106 op=LOAD Feb 8 23:24:53.483000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000388388 items=0 ppid=3209 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:53.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339363365366462616538346434396233306361383838306630386565 Feb 8 23:24:53.495000 audit: BPF prog-id=106 op=UNLOAD Feb 8 23:24:53.495000 audit: BPF prog-id=105 op=UNLOAD Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:53.495000 audit: BPF prog-id=107 op=LOAD Feb 8 23:24:53.495000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000388798 items=0 ppid=3209 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:53.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339363365366462616538346434396233306361383838306630386565 Feb 8 23:24:53.537044 env[1312]: time="2024-02-08T23:24:53.537014966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:05dc16fd-7955-413e-b7be-b337a95c87aa,Namespace:default,Attempt:0,} returns sandbox id \"3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7\"" Feb 8 23:24:53.538950 env[1312]: time="2024-02-08T23:24:53.538928504Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 8 23:24:53.788916 kubelet[1892]: E0208 23:24:53.788771 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:54.789391 kubelet[1892]: E0208 23:24:54.789336 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:55.311931 systemd-networkd[1454]: cali60e51b789ff: Gained IPv6LL Feb 8 23:24:55.790392 kubelet[1892]: E0208 23:24:55.790349 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:56.437932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3217138441.mount: Deactivated successfully. Feb 8 23:24:56.791266 kubelet[1892]: E0208 23:24:56.791157 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:57.792240 kubelet[1892]: E0208 23:24:57.792197 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:58.792939 kubelet[1892]: E0208 23:24:58.792896 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:58.887264 env[1312]: time="2024-02-08T23:24:58.887134686Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:58.893971 env[1312]: time="2024-02-08T23:24:58.893823674Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:58.898547 env[1312]: time="2024-02-08T23:24:58.898450820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:58.903365 env[1312]: time="2024-02-08T23:24:58.903330446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:58.904004 env[1312]: time="2024-02-08T23:24:58.903974397Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 8 23:24:58.906134 env[1312]: time="2024-02-08T23:24:58.906103733Z" level=info msg="CreateContainer within sandbox \"3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 8 23:24:58.946895 env[1312]: time="2024-02-08T23:24:58.946858712Z" level=info msg="CreateContainer within sandbox \"3963e6dbae84d49b30ca8880f08ee93eddc5ef0b7a141f9138d079c07540c8e7\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"87404062b40f7e73e3d25fc645500bb6b57b8ef2ed61c975f39eb6ed370621e0\"" Feb 8 23:24:58.947555 env[1312]: time="2024-02-08T23:24:58.947526961Z" level=info msg="StartContainer for \"87404062b40f7e73e3d25fc645500bb6b57b8ef2ed61c975f39eb6ed370621e0\"" Feb 8 23:24:58.974029 systemd[1]: run-containerd-runc-k8s.io-87404062b40f7e73e3d25fc645500bb6b57b8ef2ed61c975f39eb6ed370621e0-runc.Tfhjnq.mount: Deactivated successfully. Feb 8 23:24:58.977681 systemd[1]: Started cri-containerd-87404062b40f7e73e3d25fc645500bb6b57b8ef2ed61c975f39eb6ed370621e0.scope. Feb 8 23:24:59.006558 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 8 23:24:59.006688 kernel: audit: type=1400 audit(1707434698.988:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.006725 kernel: audit: type=1400 audit(1707434698.988:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.031056 kernel: audit: type=1400 audit(1707434698.988:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043086 kernel: audit: type=1400 audit(1707434698.988:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.067534 kernel: audit: type=1400 audit(1707434698.988:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.067657 kernel: audit: type=1400 audit(1707434698.988:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.068847 kernel: audit: type=1400 audit(1707434698.988:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.089662 kernel: audit: type=1400 audit(1707434698.988:772): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.089719 kernel: audit: type=1400 audit(1707434698.988:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:58.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.107865 kernel: audit: type=1400 audit(1707434699.018:774): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit: BPF prog-id=108 op=LOAD Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001b1c48 a2=10 a3=1c items=0 ppid=3209 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343034303632623430663765373365336432356663363435353030 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001b16b0 a2=3c a3=8 items=0 ppid=3209 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343034303632623430663765373365336432356663363435353030 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.018000 audit: BPF prog-id=109 op=LOAD Feb 8 23:24:59.018000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001b19d8 a2=78 a3=c000025760 items=0 ppid=3209 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343034303632623430663765373365336432356663363435353030 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.030000 audit: BPF prog-id=110 op=LOAD Feb 8 23:24:59.030000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001b1770 a2=78 a3=c0000257a8 items=0 ppid=3209 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343034303632623430663765373365336432356663363435353030 Feb 8 23:24:59.043000 audit: BPF prog-id=110 op=UNLOAD Feb 8 23:24:59.043000 audit: BPF prog-id=109 op=UNLOAD Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:59.043000 audit: BPF prog-id=111 op=LOAD Feb 8 23:24:59.043000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001b1c30 a2=78 a3=c000025bb8 items=0 ppid=3209 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343034303632623430663765373365336432356663363435353030 Feb 8 23:24:59.120821 env[1312]: time="2024-02-08T23:24:59.120787857Z" level=info msg="StartContainer for \"87404062b40f7e73e3d25fc645500bb6b57b8ef2ed61c975f39eb6ed370621e0\" returns successfully" Feb 8 23:24:59.148000 audit[3287]: AVC avc: denied { search } for pid=3287 comm="rpcbind" name="crypto" dev="proc" ino=26558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:24:59.148000 audit[3287]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f56cf10a0c0 a2=0 a3=0 items=0 ppid=3271 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 key=(null) Feb 8 23:24:59.148000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 8 23:24:59.183000 audit[3292]: AVC avc: denied { search } for pid=3292 comm="dbus-daemon" name="crypto" dev="proc" ino=26558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:24:59.183000 audit[3292]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7efc26d7b0c0 a2=0 a3=0 items=0 ppid=3271 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 key=(null) Feb 8 23:24:59.183000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 8 23:24:59.186000 audit[3293]: AVC avc: denied { watch } for pid=3293 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c458,c953 tclass=dir permissive=0 Feb 8 23:24:59.186000 audit[3293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55b127c6d970 a2=2c8 a3=7ffd8fdbee6c items=0 ppid=3271 pid=3293 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 key=(null) Feb 8 23:24:59.186000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 8 23:24:59.190000 audit[3294]: AVC avc: denied { read } for pid=3294 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26642 scontext=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 8 23:24:59.190000 audit[3294]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fe9c42ff320 a1=80000 a2=d a3=7fff7661c1a0 items=0 ppid=3271 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 key=(null) Feb 8 23:24:59.190000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 8 23:24:59.191000 audit[3294]: AVC avc: denied { search } for pid=3294 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:24:59.191000 audit[3294]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe9c38530c0 a2=0 a3=0 items=0 ppid=3271 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c458,c953 key=(null) Feb 8 23:24:59.191000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 8 23:24:59.793279 kubelet[1892]: E0208 23:24:59.793225 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:59.966119 kubelet[1892]: I0208 23:24:59.966092 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.600023726 podCreationTimestamp="2024-02-08 23:24:52 +0000 UTC" firstStartedPulling="2024-02-08 23:24:53.538259161 +0000 UTC m=+48.143384542" lastFinishedPulling="2024-02-08 23:24:58.904296772 +0000 UTC m=+53.509422153" observedRunningTime="2024-02-08 23:24:59.966002641 +0000 UTC m=+54.571128022" watchObservedRunningTime="2024-02-08 23:24:59.966061337 +0000 UTC m=+54.571186718" Feb 8 23:24:59.982000 audit[3299]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:59.982000 audit[3299]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd6858fb40 a2=0 a3=7ffd6858fb2c items=0 ppid=2037 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:59.985000 audit[3299]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:59.985000 audit[3299]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffd6858fb40 a2=0 a3=7ffd6858fb2c items=0 ppid=2037 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:25:00.794360 kubelet[1892]: E0208 23:25:00.794299 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:01.795118 kubelet[1892]: E0208 23:25:01.795061 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:02.795515 kubelet[1892]: E0208 23:25:02.795455 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:03.796214 kubelet[1892]: E0208 23:25:03.796161 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:04.797257 kubelet[1892]: E0208 23:25:04.797200 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:05.759096 kubelet[1892]: E0208 23:25:05.759042 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:05.774134 env[1312]: time="2024-02-08T23:25:05.774094091Z" level=info msg="StopPodSandbox for \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\"" Feb 8 23:25:05.797408 kubelet[1892]: E0208 23:25:05.797362 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.809 [WARNING][3318] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-csi--node--driver--5nhm4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"abebf737-7e5e-4139-9843-490bd08cb1a3", ResourceVersion:"1286", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341", Pod:"csi-node-driver-5nhm4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid2beaaf3def", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.810 [INFO][3318] k8s.go 578: Cleaning up netns ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.810 [INFO][3318] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" iface="eth0" netns="" Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.810 [INFO][3318] k8s.go 585: Releasing IP address(es) ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.810 [INFO][3318] utils.go 188: Calico CNI releasing IP address ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.830 [INFO][3324] ipam_plugin.go 415: Releasing address using handleID ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.830 [INFO][3324] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.830 [INFO][3324] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.838 [WARNING][3324] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.838 [INFO][3324] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.840 [INFO][3324] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:25:05.841717 env[1312]: 2024-02-08 23:25:05.840 [INFO][3318] k8s.go 591: Teardown processing complete. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:25:05.842461 env[1312]: time="2024-02-08T23:25:05.841744734Z" level=info msg="TearDown network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\" successfully" Feb 8 23:25:05.842461 env[1312]: time="2024-02-08T23:25:05.841778632Z" level=info msg="StopPodSandbox for \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\" returns successfully" Feb 8 23:25:05.842550 env[1312]: time="2024-02-08T23:25:05.842500483Z" level=info msg="RemovePodSandbox for \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\"" Feb 8 23:25:05.842588 env[1312]: time="2024-02-08T23:25:05.842534381Z" level=info msg="Forcibly stopping sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\"" Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.882 [WARNING][3345] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-csi--node--driver--5nhm4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"abebf737-7e5e-4139-9843-490bd08cb1a3", ResourceVersion:"1286", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"0756f428005c2e2f3ab19c71ae7d7834fe276b484d383ead294c3b4fcb3e6341", Pod:"csi-node-driver-5nhm4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid2beaaf3def", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.882 [INFO][3345] k8s.go 578: Cleaning up netns ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.882 [INFO][3345] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" iface="eth0" netns="" Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.882 [INFO][3345] k8s.go 585: Releasing IP address(es) ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.882 [INFO][3345] utils.go 188: Calico CNI releasing IP address ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.909 [INFO][3351] ipam_plugin.go 415: Releasing address using handleID ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.910 [INFO][3351] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.910 [INFO][3351] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.916 [WARNING][3351] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.916 [INFO][3351] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" HandleID="k8s-pod-network.ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Workload="10.200.8.31-k8s-csi--node--driver--5nhm4-eth0" Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.918 [INFO][3351] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:25:05.920408 env[1312]: 2024-02-08 23:25:05.919 [INFO][3345] k8s.go 591: Teardown processing complete. ContainerID="ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22" Feb 8 23:25:05.921101 env[1312]: time="2024-02-08T23:25:05.920430534Z" level=info msg="TearDown network for sandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\" successfully" Feb 8 23:25:06.232467 env[1312]: time="2024-02-08T23:25:06.232404483Z" level=info msg="RemovePodSandbox \"ba1d50ccd9585151b6073dfe62f419e1e62556e511b067690a7d5189c240eb22\" returns successfully" Feb 8 23:25:06.233424 env[1312]: time="2024-02-08T23:25:06.233388918Z" level=info msg="StopPodSandbox for \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\"" Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.268 [WARNING][3371] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"de7efcc4-c6e7-4782-a0d5-9937641777bc", ResourceVersion:"1301", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a", Pod:"nginx-deployment-6d5f899847-f8947", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieab37d84959", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.268 [INFO][3371] k8s.go 578: Cleaning up netns ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.268 [INFO][3371] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" iface="eth0" netns="" Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.268 [INFO][3371] k8s.go 585: Releasing IP address(es) ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.268 [INFO][3371] utils.go 188: Calico CNI releasing IP address ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.286 [INFO][3378] ipam_plugin.go 415: Releasing address using handleID ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.286 [INFO][3378] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.286 [INFO][3378] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.294 [WARNING][3378] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.294 [INFO][3378] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.295 [INFO][3378] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:25:06.297655 env[1312]: 2024-02-08 23:25:06.296 [INFO][3371] k8s.go 591: Teardown processing complete. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:25:06.298517 env[1312]: time="2024-02-08T23:25:06.298477910Z" level=info msg="TearDown network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\" successfully" Feb 8 23:25:06.298611 env[1312]: time="2024-02-08T23:25:06.298592702Z" level=info msg="StopPodSandbox for \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\" returns successfully" Feb 8 23:25:06.299221 env[1312]: time="2024-02-08T23:25:06.299188963Z" level=info msg="RemovePodSandbox for \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\"" Feb 8 23:25:06.299417 env[1312]: time="2024-02-08T23:25:06.299357651Z" level=info msg="Forcibly stopping sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\"" Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.332 [WARNING][3397] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"de7efcc4-c6e7-4782-a0d5-9937641777bc", ResourceVersion:"1301", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"583b53553d1f03cccd38260c9886e48f2f2374063a9c8430b94ae9681498402a", Pod:"nginx-deployment-6d5f899847-f8947", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieab37d84959", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.332 [INFO][3397] k8s.go 578: Cleaning up netns ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.332 [INFO][3397] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" iface="eth0" netns="" Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.332 [INFO][3397] k8s.go 585: Releasing IP address(es) ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.332 [INFO][3397] utils.go 188: Calico CNI releasing IP address ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.349 [INFO][3403] ipam_plugin.go 415: Releasing address using handleID ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.349 [INFO][3403] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.349 [INFO][3403] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.357 [WARNING][3403] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.357 [INFO][3403] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" HandleID="k8s-pod-network.7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Workload="10.200.8.31-k8s-nginx--deployment--6d5f899847--f8947-eth0" Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.359 [INFO][3403] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:25:06.361456 env[1312]: 2024-02-08 23:25:06.359 [INFO][3397] k8s.go 591: Teardown processing complete. ContainerID="7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8" Feb 8 23:25:06.361456 env[1312]: time="2024-02-08T23:25:06.361040168Z" level=info msg="TearDown network for sandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\" successfully" Feb 8 23:25:06.691805 env[1312]: time="2024-02-08T23:25:06.691695281Z" level=info msg="RemovePodSandbox \"7262f2feaa6e4f55d5a5a392f481ef408e8bcb1513ff4147b9b7887fc8b97cd8\" returns successfully" Feb 8 23:25:06.798113 kubelet[1892]: E0208 23:25:06.798067 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:07.798247 kubelet[1892]: E0208 23:25:07.798193 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:08.798964 kubelet[1892]: E0208 23:25:08.798916 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:09.800109 kubelet[1892]: E0208 23:25:09.800054 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:09.999973 systemd[1]: run-containerd-runc-k8s.io-bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e-runc.BTp8pi.mount: Deactivated successfully. Feb 8 23:25:10.801120 kubelet[1892]: E0208 23:25:10.801060 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:11.801820 kubelet[1892]: E0208 23:25:11.801765 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:12.801988 kubelet[1892]: E0208 23:25:12.801926 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:13.802943 kubelet[1892]: E0208 23:25:13.802887 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:14.803381 kubelet[1892]: E0208 23:25:14.803324 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:15.804152 kubelet[1892]: E0208 23:25:15.804065 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:16.804424 kubelet[1892]: E0208 23:25:16.804386 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:17.805577 kubelet[1892]: E0208 23:25:17.805517 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:18.806310 kubelet[1892]: E0208 23:25:18.806224 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:19.807043 kubelet[1892]: E0208 23:25:19.806989 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:20.808064 kubelet[1892]: E0208 23:25:20.808010 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:21.808465 kubelet[1892]: E0208 23:25:21.808417 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:22.809543 kubelet[1892]: E0208 23:25:22.809450 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:23.809948 kubelet[1892]: E0208 23:25:23.809905 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:24.256044 kubelet[1892]: I0208 23:25:24.256001 1892 topology_manager.go:215] "Topology Admit Handler" podUID="0e200a55-038c-4137-a269-dfef2ba92045" podNamespace="default" podName="test-pod-1" Feb 8 23:25:24.261509 systemd[1]: Created slice kubepods-besteffort-pod0e200a55_038c_4137_a269_dfef2ba92045.slice. Feb 8 23:25:24.306017 kubelet[1892]: I0208 23:25:24.305972 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-7ca9bca0-f358-4f7f-b6fc-88be3bf79f72\" (UniqueName: \"kubernetes.io/nfs/0e200a55-038c-4137-a269-dfef2ba92045-pvc-7ca9bca0-f358-4f7f-b6fc-88be3bf79f72\") pod \"test-pod-1\" (UID: \"0e200a55-038c-4137-a269-dfef2ba92045\") " pod="default/test-pod-1" Feb 8 23:25:24.306017 kubelet[1892]: I0208 23:25:24.306026 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttqfd\" (UniqueName: \"kubernetes.io/projected/0e200a55-038c-4137-a269-dfef2ba92045-kube-api-access-ttqfd\") pod \"test-pod-1\" (UID: \"0e200a55-038c-4137-a269-dfef2ba92045\") " pod="default/test-pod-1" Feb 8 23:25:24.494346 kernel: Failed to create system directory netfs Feb 8 23:25:24.494481 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 8 23:25:24.494510 kernel: audit: type=1400 audit(1707434724.486:790): avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.486000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.513598 kernel: Failed to create system directory netfs Feb 8 23:25:24.513679 kernel: audit: type=1400 audit(1707434724.486:790): avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.486000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.532294 kernel: Failed to create system directory netfs Feb 8 23:25:24.532354 kernel: audit: type=1400 audit(1707434724.486:790): avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.486000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.551037 kernel: Failed to create system directory netfs Feb 8 23:25:24.551097 kernel: audit: type=1400 audit(1707434724.486:790): avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.486000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.486000 audit[3459]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56144d9e35e0 a1=153bc a2=56144bb292b0 a3=5 items=0 ppid=1006 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:24.486000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:25:24.595446 kernel: audit: type=1300 audit(1707434724.486:790): arch=c000003e syscall=175 success=yes exit=0 a0=56144d9e35e0 a1=153bc a2=56144bb292b0 a3=5 items=0 ppid=1006 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:24.595532 kernel: audit: type=1327 audit(1707434724.486:790): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.621129 kernel: Failed to create system directory fscache Feb 8 23:25:24.621187 kernel: audit: type=1400 audit(1707434724.597:791): avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.621208 kernel: Failed to create system directory fscache Feb 8 23:25:24.639443 kernel: audit: type=1400 audit(1707434724.597:791): avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.639556 kernel: Failed to create system directory fscache Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.657339 kernel: audit: type=1400 audit(1707434724.597:791): avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.657393 kernel: Failed to create system directory fscache Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.676032 kernel: audit: type=1400 audit(1707434724.597:791): avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.676087 kernel: Failed to create system directory fscache Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.682371 kernel: Failed to create system directory fscache Feb 8 23:25:24.682450 kernel: Failed to create system directory fscache Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.688711 kernel: Failed to create system directory fscache Feb 8 23:25:24.688767 kernel: Failed to create system directory fscache Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.691853 kernel: Failed to create system directory fscache Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.698241 kernel: Failed to create system directory fscache Feb 8 23:25:24.698296 kernel: Failed to create system directory fscache Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.704445 kernel: Failed to create system directory fscache Feb 8 23:25:24.704489 kernel: Failed to create system directory fscache Feb 8 23:25:24.597000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.597000 audit[3459]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56144dbf89c0 a1=4c0fc a2=56144bb292b0 a3=5 items=0 ppid=1006 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:24.597000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:25:24.711902 kernel: FS-Cache: Loaded Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.807164 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.807234 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.807258 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.810573 kubelet[1892]: E0208 23:25:24.810550 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:24.813494 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.813552 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.819499 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.819556 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.825517 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.825572 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.831463 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.831528 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.837305 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.837368 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.843197 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.843248 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.848957 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.849022 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.852377 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.857375 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.857431 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.862457 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.862568 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.867783 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.867846 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.873015 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.873070 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.878499 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.878558 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.883661 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.883716 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.888724 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.888780 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.893485 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.893545 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.895949 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.900588 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.900653 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.902851 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.908005 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.908067 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.912647 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.912704 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.917228 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.917286 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.921759 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.921815 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.926215 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.926268 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.930716 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.930771 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.935221 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.935273 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.939762 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.939819 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.944101 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.944148 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.948712 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.948768 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.953267 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.953320 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.957686 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.957733 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.962545 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.962600 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.967079 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.967135 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.971433 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.971492 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.975753 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.975807 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.980202 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.980257 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.984668 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.984722 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.986859 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.991235 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.991288 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.995718 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.995773 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.000103 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.000162 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.004368 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.004422 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.008843 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.011383 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.011462 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.018563 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.018622 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.018648 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.022897 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.022949 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.027212 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.027266 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.031762 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.031816 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.036130 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.036185 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.040635 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.040689 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.045312 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.045365 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.049974 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.050030 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.054586 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.054651 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.058213 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.061521 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.061575 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.065906 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.065952 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.068853 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.070875 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.074971 kernel: Failed to create system directory sunrpc Feb 8 23:25:25.075016 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.077408 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.079810 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.081964 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.084143 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.086509 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.088677 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.091015 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.093473 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.095869 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.098146 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.100484 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.102735 kernel: Failed to create system directory sunrpc Feb 8 23:25:24.786000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.116093 kernel: RPC: Registered named UNIX socket transport module. Feb 8 23:25:25.116149 kernel: RPC: Registered udp transport module. Feb 8 23:25:25.116175 kernel: RPC: Registered tcp transport module. Feb 8 23:25:25.118262 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 8 23:25:24.786000 audit[3459]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56144dc44ad0 a1=1588c4 a2=56144bb292b0 a3=5 items=6 ppid=1006 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:24.786000 audit: CWD cwd="/" Feb 8 23:25:24.786000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:25:24.786000 audit: PATH item=1 name=(null) inode=27065 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:25:24.786000 audit: PATH item=2 name=(null) inode=27065 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:25:24.786000 audit: PATH item=3 name=(null) inode=27066 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:25:24.786000 audit: PATH item=4 name=(null) inode=27065 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:25:24.786000 audit: PATH item=5 name=(null) inode=27067 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:25:24.786000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.271631 kernel: Failed to create system directory nfs Feb 8 23:25:25.271693 kernel: Failed to create system directory nfs Feb 8 23:25:25.271712 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.276415 kernel: Failed to create system directory nfs Feb 8 23:25:25.276460 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.281145 kernel: Failed to create system directory nfs Feb 8 23:25:25.281196 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.285960 kernel: Failed to create system directory nfs Feb 8 23:25:25.286015 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.290330 kernel: Failed to create system directory nfs Feb 8 23:25:25.290386 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.294765 kernel: Failed to create system directory nfs Feb 8 23:25:25.294845 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.299672 kernel: Failed to create system directory nfs Feb 8 23:25:25.299732 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.304358 kernel: Failed to create system directory nfs Feb 8 23:25:25.304415 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.309009 kernel: Failed to create system directory nfs Feb 8 23:25:25.309075 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.313729 kernel: Failed to create system directory nfs Feb 8 23:25:25.313781 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.318404 kernel: Failed to create system directory nfs Feb 8 23:25:25.319075 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.323292 kernel: Failed to create system directory nfs Feb 8 23:25:25.323331 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.328025 kernel: Failed to create system directory nfs Feb 8 23:25:25.328080 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.332890 kernel: Failed to create system directory nfs Feb 8 23:25:25.332927 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.337669 kernel: Failed to create system directory nfs Feb 8 23:25:25.337718 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.342375 kernel: Failed to create system directory nfs Feb 8 23:25:25.342423 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.347080 kernel: Failed to create system directory nfs Feb 8 23:25:25.347127 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.351935 kernel: Failed to create system directory nfs Feb 8 23:25:25.351980 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.356664 kernel: Failed to create system directory nfs Feb 8 23:25:25.356714 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.361364 kernel: Failed to create system directory nfs Feb 8 23:25:25.361425 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.366163 kernel: Failed to create system directory nfs Feb 8 23:25:25.366222 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.370783 kernel: Failed to create system directory nfs Feb 8 23:25:25.370848 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.373847 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.377970 kernel: Failed to create system directory nfs Feb 8 23:25:25.378018 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.382521 kernel: Failed to create system directory nfs Feb 8 23:25:25.382567 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.385876 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.389569 kernel: Failed to create system directory nfs Feb 8 23:25:25.389617 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.391924 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.396435 kernel: Failed to create system directory nfs Feb 8 23:25:25.396470 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.400715 kernel: Failed to create system directory nfs Feb 8 23:25:25.400765 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.256000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.404978 kernel: Failed to create system directory nfs Feb 8 23:25:25.256000 audit[3459]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56144dde7680 a1=e29dc a2=56144bb292b0 a3=5 items=0 ppid=1006 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:25.256000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:25:25.419867 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.514717 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.514771 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.514802 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.519295 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.519342 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.523991 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.524040 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.528769 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.528820 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.533491 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.533535 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.538016 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.538077 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.542396 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.542434 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.547194 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.547261 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.551928 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.552004 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.556586 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.556631 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.561202 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.563715 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.566893 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.566937 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.570928 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.570974 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.575732 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.575767 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.580468 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.580512 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.585327 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.585363 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.590105 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.590153 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.594781 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.594817 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.599640 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.599686 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.604395 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.604438 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.606842 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.611742 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.611794 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.616521 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.616564 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.620779 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.620817 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.622856 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.625280 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.630061 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.630126 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.634758 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.634819 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.639473 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.639512 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.644177 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.644232 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.649002 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.649048 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.653734 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.653771 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.658427 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.658489 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.663010 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.663074 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.665855 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.669788 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.669845 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.674237 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.674273 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.679001 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.679049 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.683666 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.683704 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.688446 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.688499 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.693085 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.693135 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.697750 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.697809 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.702133 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.702180 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.706478 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.706533 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.710843 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.710898 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.715120 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.715172 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.719580 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.720218 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.724121 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.724164 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.493000 audit[3464]: AVC avc: denied { confidentiality } for pid=3464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.728603 kernel: Failed to create system directory nfs4 Feb 8 23:25:25.758581 kubelet[1892]: E0208 23:25:25.758544 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:25.811913 kubelet[1892]: E0208 23:25:25.811870 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:25.873710 kernel: NFS: Registering the id_resolver key type Feb 8 23:25:25.873784 kernel: Key type id_resolver registered Feb 8 23:25:25.873810 kernel: Key type id_legacy registered Feb 8 23:25:25.493000 audit[3464]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7efd83144010 a1=1d3cc4 a2=555ec74642b0 a3=5 items=0 ppid=1006 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:25.493000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.935032 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.935111 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.935138 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.939617 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.939678 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.944684 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.944732 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.947298 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.952253 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.952310 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.957145 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.957203 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.962144 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.962193 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.967175 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.967231 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.972173 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.972222 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.977042 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.977082 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.982117 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.982170 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.986966 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.987015 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.991955 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.991994 kernel: Failed to create system directory rpcgss Feb 8 23:25:25.924000 audit[3465]: AVC avc: denied { confidentiality } for pid=3465 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:25:25.924000 audit[3465]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f847ca80010 a1=4f524 a2=558e56aec2b0 a3=5 items=0 ppid=1006 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:25.924000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 8 23:25:26.195083 nfsidmap[3471]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-7d5bfcb083' Feb 8 23:25:26.210637 nfsidmap[3472]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-7d5bfcb083' Feb 8 23:25:26.224000 audit[1410]: AVC avc: denied { watch_reads } for pid=1410 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:25:26.224000 audit[1410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=559abd2ac7a0 a2=10 a3=700920d610908812 items=0 ppid=1 pid=1410 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.224000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:25:26.224000 audit[1410]: AVC avc: denied { watch_reads } for pid=1410 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:25:26.224000 audit[1410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=559abd2ac7a0 a2=10 a3=700920d610908812 items=0 ppid=1 pid=1410 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.224000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:25:26.224000 audit[1410]: AVC avc: denied { watch_reads } for pid=1410 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:25:26.224000 audit[1410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=559abd2ac7a0 a2=10 a3=700920d610908812 items=0 ppid=1 pid=1410 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.224000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:25:26.224000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:25:26.224000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:25:26.224000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:25:26.365097 env[1312]: time="2024-02-08T23:25:26.365043649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0e200a55-038c-4137-a269-dfef2ba92045,Namespace:default,Attempt:0,}" Feb 8 23:25:26.511338 systemd-networkd[1454]: cali5ec59c6bf6e: Link UP Feb 8 23:25:26.520567 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:25:26.520664 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 8 23:25:26.520263 systemd-networkd[1454]: cali5ec59c6bf6e: Gained carrier Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.444 [INFO][3474] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.31-k8s-test--pod--1-eth0 default 0e200a55-038c-4137-a269-dfef2ba92045 1423 0 2024-02-08 23:24:54 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.31 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.31-k8s-test--pod--1-" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.444 [INFO][3474] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.31-k8s-test--pod--1-eth0" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.472 [INFO][3485] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" HandleID="k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Workload="10.200.8.31-k8s-test--pod--1-eth0" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.482 [INFO][3485] ipam_plugin.go 268: Auto assigning IP ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" HandleID="k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Workload="10.200.8.31-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002afaa0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.31", "pod":"test-pod-1", "timestamp":"2024-02-08 23:25:26.472641447 +0000 UTC"}, Hostname:"10.200.8.31", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.483 [INFO][3485] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.483 [INFO][3485] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.483 [INFO][3485] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.31' Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.484 [INFO][3485] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.488 [INFO][3485] ipam.go 372: Looking up existing affinities for host host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.492 [INFO][3485] ipam.go 489: Trying affinity for 192.168.67.64/26 host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.495 [INFO][3485] ipam.go 155: Attempting to load block cidr=192.168.67.64/26 host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.497 [INFO][3485] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.64/26 host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.497 [INFO][3485] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.64/26 handle="k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.498 [INFO][3485] ipam.go 1682: Creating new handle: k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02 Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.501 [INFO][3485] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.64/26 handle="k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.507 [INFO][3485] ipam.go 1216: Successfully claimed IPs: [192.168.67.68/26] block=192.168.67.64/26 handle="k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.507 [INFO][3485] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.68/26] handle="k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" host="10.200.8.31" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.507 [INFO][3485] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.507 [INFO][3485] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.68/26] IPv6=[] ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" HandleID="k8s-pod-network.97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Workload="10.200.8.31-k8s-test--pod--1-eth0" Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.508 [INFO][3474] k8s.go 385: Populated endpoint ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.31-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0e200a55-038c-4137-a269-dfef2ba92045", ResourceVersion:"1423", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:25:26.530121 env[1312]: 2024-02-08 23:25:26.508 [INFO][3474] k8s.go 386: Calico CNI using IPs: [192.168.67.68/32] ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.31-k8s-test--pod--1-eth0" Feb 8 23:25:26.531812 env[1312]: 2024-02-08 23:25:26.508 [INFO][3474] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.31-k8s-test--pod--1-eth0" Feb 8 23:25:26.531812 env[1312]: 2024-02-08 23:25:26.521 [INFO][3474] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.31-k8s-test--pod--1-eth0" Feb 8 23:25:26.531812 env[1312]: 2024-02-08 23:25:26.521 [INFO][3474] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.31-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.31-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0e200a55-038c-4137-a269-dfef2ba92045", ResourceVersion:"1423", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 24, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.31", ContainerID:"97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"96:ca:69:f5:4a:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:25:26.531812 env[1312]: 2024-02-08 23:25:26.526 [INFO][3474] k8s.go 491: Wrote updated endpoint to datastore ContainerID="97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.31-k8s-test--pod--1-eth0" Feb 8 23:25:26.546000 audit[3504]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3504 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:25:26.546000 audit[3504]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7ffeac3589c0 a2=0 a3=7ffeac3589ac items=0 ppid=2581 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.546000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:25:26.554167 env[1312]: time="2024-02-08T23:25:26.554109732Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:25:26.554167 env[1312]: time="2024-02-08T23:25:26.554143530Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:25:26.554686 env[1312]: time="2024-02-08T23:25:26.554157029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:25:26.555023 env[1312]: time="2024-02-08T23:25:26.554938491Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02 pid=3513 runtime=io.containerd.runc.v2 Feb 8 23:25:26.569880 systemd[1]: Started cri-containerd-97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02.scope. Feb 8 23:25:26.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit: BPF prog-id=112 op=LOAD Feb 8 23:25:26.583000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.583000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3513 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937643131313837316265376661343731626366653730643230626536 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3513 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937643131313837316265376661343731626366653730643230626536 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit: BPF prog-id=113 op=LOAD Feb 8 23:25:26.584000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ac7b0 items=0 ppid=3513 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937643131313837316265376661343731626366653730643230626536 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit: BPF prog-id=114 op=LOAD Feb 8 23:25:26.584000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ac7f8 items=0 ppid=3513 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937643131313837316265376661343731626366653730643230626536 Feb 8 23:25:26.584000 audit: BPF prog-id=114 op=UNLOAD Feb 8 23:25:26.584000 audit: BPF prog-id=113 op=UNLOAD Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:26.584000 audit: BPF prog-id=115 op=LOAD Feb 8 23:25:26.584000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003acc08 items=0 ppid=3513 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937643131313837316265376661343731626366653730643230626536 Feb 8 23:25:26.614984 env[1312]: time="2024-02-08T23:25:26.614950633Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0e200a55-038c-4137-a269-dfef2ba92045,Namespace:default,Attempt:0,} returns sandbox id \"97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02\"" Feb 8 23:25:26.616636 env[1312]: time="2024-02-08T23:25:26.616613851Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 8 23:25:26.812647 kubelet[1892]: E0208 23:25:26.812530 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:27.239012 env[1312]: time="2024-02-08T23:25:27.238971022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:25:27.248280 env[1312]: time="2024-02-08T23:25:27.248243571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:25:27.253419 env[1312]: time="2024-02-08T23:25:27.253387620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:25:27.257645 env[1312]: time="2024-02-08T23:25:27.257614814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:25:27.258229 env[1312]: time="2024-02-08T23:25:27.258200286Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 8 23:25:27.260557 env[1312]: time="2024-02-08T23:25:27.260528773Z" level=info msg="CreateContainer within sandbox \"97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 8 23:25:27.290760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3268866167.mount: Deactivated successfully. Feb 8 23:25:27.298192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount253502248.mount: Deactivated successfully. Feb 8 23:25:27.310805 env[1312]: time="2024-02-08T23:25:27.310767327Z" level=info msg="CreateContainer within sandbox \"97d111871be7fa471bcfe70d20be6d76fa66560803cc04558627ad560a757b02\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"23e212a1cee3df808f00b64dccdfa751710a83db8ac5cb34f6f21614e3ddcae2\"" Feb 8 23:25:27.311357 env[1312]: time="2024-02-08T23:25:27.311320400Z" level=info msg="StartContainer for \"23e212a1cee3df808f00b64dccdfa751710a83db8ac5cb34f6f21614e3ddcae2\"" Feb 8 23:25:27.327450 systemd[1]: Started cri-containerd-23e212a1cee3df808f00b64dccdfa751710a83db8ac5cb34f6f21614e3ddcae2.scope. Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.339000 audit: BPF prog-id=116 op=LOAD Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3513 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:27.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233653231326131636565336466383038663030623634646363646661 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3513 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:27.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233653231326131636565336466383038663030623634646363646661 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit: BPF prog-id=117 op=LOAD Feb 8 23:25:27.340000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e0680 items=0 ppid=3513 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:27.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233653231326131636565336466383038663030623634646363646661 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit: BPF prog-id=118 op=LOAD Feb 8 23:25:27.340000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e06c8 items=0 ppid=3513 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:27.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233653231326131636565336466383038663030623634646363646661 Feb 8 23:25:27.340000 audit: BPF prog-id=118 op=UNLOAD Feb 8 23:25:27.340000 audit: BPF prog-id=117 op=UNLOAD Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:25:27.340000 audit: BPF prog-id=119 op=LOAD Feb 8 23:25:27.340000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e0ad8 items=0 ppid=3513 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:27.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233653231326131636565336466383038663030623634646363646661 Feb 8 23:25:27.359103 env[1312]: time="2024-02-08T23:25:27.359065075Z" level=info msg="StartContainer for \"23e212a1cee3df808f00b64dccdfa751710a83db8ac5cb34f6f21614e3ddcae2\" returns successfully" Feb 8 23:25:27.813470 kubelet[1892]: E0208 23:25:27.813434 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:27.823144 systemd-networkd[1454]: cali5ec59c6bf6e: Gained IPv6LL Feb 8 23:25:28.033567 kubelet[1892]: I0208 23:25:28.033532 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=33.391069566 podCreationTimestamp="2024-02-08 23:24:54 +0000 UTC" firstStartedPulling="2024-02-08 23:25:26.616053579 +0000 UTC m=+81.221178860" lastFinishedPulling="2024-02-08 23:25:27.258480972 +0000 UTC m=+81.863606353" observedRunningTime="2024-02-08 23:25:28.033233572 +0000 UTC m=+82.638358853" watchObservedRunningTime="2024-02-08 23:25:28.033497059 +0000 UTC m=+82.638622340" Feb 8 23:25:28.814108 kubelet[1892]: E0208 23:25:28.814046 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:29.814353 kubelet[1892]: E0208 23:25:29.814315 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:30.815490 kubelet[1892]: E0208 23:25:30.815439 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:31.816253 kubelet[1892]: E0208 23:25:31.816221 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:32.817285 kubelet[1892]: E0208 23:25:32.817215 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:33.817986 kubelet[1892]: E0208 23:25:33.817946 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:34.818609 kubelet[1892]: E0208 23:25:34.818515 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:35.819259 kubelet[1892]: E0208 23:25:35.819162 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:36.819729 kubelet[1892]: E0208 23:25:36.819674 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:37.820245 kubelet[1892]: E0208 23:25:37.820214 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:38.820944 kubelet[1892]: E0208 23:25:38.820893 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:39.821983 kubelet[1892]: E0208 23:25:39.821950 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:40.000439 systemd[1]: run-containerd-runc-k8s.io-bb1f9518d852751d4de715c21f79b978adf6704e6fc30d818fda4c8b413cd05e-runc.hXMMWy.mount: Deactivated successfully. Feb 8 23:25:40.823159 kubelet[1892]: E0208 23:25:40.823104 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:41.824354 kubelet[1892]: E0208 23:25:41.824270 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:42.824571 kubelet[1892]: E0208 23:25:42.824530 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:43.825782 kubelet[1892]: E0208 23:25:43.825703 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:44.826784 kubelet[1892]: E0208 23:25:44.826727 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:45.759142 kubelet[1892]: E0208 23:25:45.759057 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:45.827259 kubelet[1892]: E0208 23:25:45.827176 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:46.828127 kubelet[1892]: E0208 23:25:46.828023 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:47.828896 kubelet[1892]: E0208 23:25:47.828840 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:48.829269 kubelet[1892]: E0208 23:25:48.829216 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:49.829396 kubelet[1892]: E0208 23:25:49.829354 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:50.829550 kubelet[1892]: E0208 23:25:50.829492 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:51.829725 kubelet[1892]: E0208 23:25:51.829685 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:52.830005 kubelet[1892]: E0208 23:25:52.829948 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:53.830875 kubelet[1892]: E0208 23:25:53.830779 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:54.831868 kubelet[1892]: E0208 23:25:54.831738 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:55.832618 kubelet[1892]: E0208 23:25:55.832548 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:56.833501 kubelet[1892]: E0208 23:25:56.833440 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:57.269953 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.283042 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.295618 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.307841 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.319793 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.333061 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.333295 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.342884 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.352842 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.381540 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.381783 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.381948 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.382093 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.382225 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.382376 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.382505 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.382629 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.391512 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.391726 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.400880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.401097 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.410502 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.437581 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.437779 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.437915 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.438041 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.438170 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.438301 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.448613 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.462462 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.462613 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.481155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.490719 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.490874 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.491018 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.491152 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.491281 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.491411 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.491538 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.491651 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.506045 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.515293 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.524860 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.529545 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.538807 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.543500 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.548274 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.548477 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.548613 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.548751 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.548900 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.549034 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.558171 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.577396 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.577576 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.577690 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.577799 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.587110 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.601207 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.601380 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.601522 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.601653 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.601785 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.611002 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.625404 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.630214 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.639311 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.648725 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.653392 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.653536 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.653667 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.653788 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.653931 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.654056 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.662844 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.663052 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.671970 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.681399 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.691129 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.700784 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.705693 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.705865 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.706009 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.706140 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.706250 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.719996 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.729456 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.729620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.743725 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.753078 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.758141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.758316 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.758451 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.758591 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.758757 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.758899 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.772767 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.795996 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.811935 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.812107 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.812257 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.812392 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.812526 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.812654 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.812790 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.812925 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.813053 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.824823 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.843994 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.848813 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.862991 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.863183 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.863326 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.863456 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.863586 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.863716 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.863866 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.864001 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.864136 kubelet[1892]: E0208 23:25:57.834200 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:25:57.872902 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.882352 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.891657 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.905532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.914886 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.915039 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.915174 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.915309 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.915440 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.915571 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.915698 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.929146 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.938159 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.952783 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.957424 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.971409 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.971612 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.971754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.971897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.972031 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.972172 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.972304 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.972434 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:57.985345 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.012856 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.022840 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.022991 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.023122 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.023252 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.023386 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.023514 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.023643 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.023768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.023907 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.032506 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.046202 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.055767 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.075675 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.075868 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.076008 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.076138 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.076271 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.076402 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.076533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.076664 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.083897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.107014 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.111874 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.126350 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.126494 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.126623 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.126754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.126910 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.127040 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.127170 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.127299 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.135930 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.145726 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.145971 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.146147 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.167960 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.177238 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.177393 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.177526 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.190227 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.190565 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.207054 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.226195 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.226346 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.226491 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.226625 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.226769 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.226933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.231110 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.240604 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.240867 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.249822 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.250074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.259340 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.259570 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.269178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.269390 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.278683 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.278903 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.288444 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.288656 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.298099 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#75 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.298323 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#76 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.307775 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#77 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.308005 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#78 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.317106 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#80 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.317324 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#81 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.321889 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#82 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.331419 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#79 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.331620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#83 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.340536 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#84 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:58.340745 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#85 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001