Feb  9 00:15:52.040125 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024
Feb  9 00:15:52.040158 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9
Feb  9 00:15:52.040173 kernel: BIOS-provided physical RAM map:
Feb  9 00:15:52.040184 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable
Feb  9 00:15:52.040193 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved
Feb  9 00:15:52.040203 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable
Feb  9 00:15:52.040219 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved
Feb  9 00:15:52.040230 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data
Feb  9 00:15:52.040240 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS
Feb  9 00:15:52.040251 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable
Feb  9 00:15:52.040262 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable
Feb  9 00:15:52.040272 kernel: printk: bootconsole [earlyser0] enabled
Feb  9 00:15:52.040282 kernel: NX (Execute Disable) protection: active
Feb  9 00:15:52.040293 kernel: efi: EFI v2.70 by Microsoft
Feb  9 00:15:52.040309 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 
Feb  9 00:15:52.040321 kernel: random: crng init done
Feb  9 00:15:52.040332 kernel: SMBIOS 3.1.0 present.
Feb  9 00:15:52.040344 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023
Feb  9 00:15:52.040356 kernel: Hypervisor detected: Microsoft Hyper-V
Feb  9 00:15:52.040367 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2
Feb  9 00:15:52.040379 kernel: Hyper-V Host Build:20348-10.0-1-0.1544
Feb  9 00:15:52.040390 kernel: Hyper-V: Nested features: 0x1e0101
Feb  9 00:15:52.040404 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40
Feb  9 00:15:52.040415 kernel: Hyper-V: Using hypercall for remote TLB flush
Feb  9 00:15:52.040427 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns
Feb  9 00:15:52.040439 kernel: tsc: Marking TSC unstable due to running on Hyper-V
Feb  9 00:15:52.040451 kernel: tsc: Detected 2593.905 MHz processor
Feb  9 00:15:52.040463 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Feb  9 00:15:52.040475 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Feb  9 00:15:52.040487 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000
Feb  9 00:15:52.040499 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Feb  9 00:15:52.040511 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved
Feb  9 00:15:52.040526 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000
Feb  9 00:15:52.040537 kernel: Using GB pages for direct mapping
Feb  9 00:15:52.040549 kernel: Secure boot disabled
Feb  9 00:15:52.040560 kernel: ACPI: Early table checksum verification disabled
Feb  9 00:15:52.040572 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL)
Feb  9 00:15:52.040584 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040595 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040608 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01   00000001 MSFT 05000000)
Feb  9 00:15:52.040626 kernel: ACPI: FACS 0x000000003FFFE000 000040
Feb  9 00:15:52.040638 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040649 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040661 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040673 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040685 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040700 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040712 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Feb  9 00:15:52.040724 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113]
Feb  9 00:15:52.040737 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183]
Feb  9 00:15:52.040749 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f]
Feb  9 00:15:52.040762 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063]
Feb  9 00:15:52.040775 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f]
Feb  9 00:15:52.040787 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027]
Feb  9 00:15:52.040804 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057]
Feb  9 00:15:52.040817 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf]
Feb  9 00:15:52.040830 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037]
Feb  9 00:15:52.040843 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033]
Feb  9 00:15:52.040856 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Feb  9 00:15:52.040869 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0
Feb  9 00:15:52.040882 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug
Feb  9 00:15:52.040896 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug
Feb  9 00:15:52.040908 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug
Feb  9 00:15:52.040925 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug
Feb  9 00:15:52.040938 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug
Feb  9 00:15:52.040951 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug
Feb  9 00:15:52.040965 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug
Feb  9 00:15:52.040979 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug
Feb  9 00:15:52.041026 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug
Feb  9 00:15:52.041038 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug
Feb  9 00:15:52.041050 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug
Feb  9 00:15:52.041063 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug
Feb  9 00:15:52.041079 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug
Feb  9 00:15:52.041091 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug
Feb  9 00:15:52.041102 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug
Feb  9 00:15:52.041114 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug
Feb  9 00:15:52.041125 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff]
Feb  9 00:15:52.041137 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff]
Feb  9 00:15:52.041149 kernel: Zone ranges:
Feb  9 00:15:52.041161 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Feb  9 00:15:52.041173 kernel:   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Feb  9 00:15:52.041189 kernel:   Normal   [mem 0x0000000100000000-0x00000002bfffffff]
Feb  9 00:15:52.041201 kernel: Movable zone start for each node
Feb  9 00:15:52.041212 kernel: Early memory node ranges
Feb  9 00:15:52.041224 kernel:   node   0: [mem 0x0000000000001000-0x000000000009ffff]
Feb  9 00:15:52.041235 kernel:   node   0: [mem 0x0000000000100000-0x000000003ff40fff]
Feb  9 00:15:52.041247 kernel:   node   0: [mem 0x000000003ffff000-0x000000003fffffff]
Feb  9 00:15:52.041259 kernel:   node   0: [mem 0x0000000100000000-0x00000002bfffffff]
Feb  9 00:15:52.041271 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff]
Feb  9 00:15:52.041283 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Feb  9 00:15:52.041297 kernel: On node 0, zone DMA: 96 pages in unavailable ranges
Feb  9 00:15:52.041309 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges
Feb  9 00:15:52.041321 kernel: ACPI: PM-Timer IO Port: 0x408
Feb  9 00:15:52.041332 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1])
Feb  9 00:15:52.041345 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23
Feb  9 00:15:52.041356 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Feb  9 00:15:52.041369 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Feb  9 00:15:52.041380 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200
Feb  9 00:15:52.041393 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs
Feb  9 00:15:52.041406 kernel: [mem 0x40000000-0xffffffff] available for PCI devices
Feb  9 00:15:52.041419 kernel: Booting paravirtualized kernel on Hyper-V
Feb  9 00:15:52.041431 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Feb  9 00:15:52.041444 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
Feb  9 00:15:52.041455 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576
Feb  9 00:15:52.041467 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152
Feb  9 00:15:52.041479 kernel: pcpu-alloc: [0] 0 1 
Feb  9 00:15:52.041490 kernel: Hyper-V: PV spinlocks enabled
Feb  9 00:15:52.041502 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Feb  9 00:15:52.041516 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 2062618
Feb  9 00:15:52.041529 kernel: Policy zone: Normal
Feb  9 00:15:52.041543 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9
Feb  9 00:15:52.041556 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Feb  9 00:15:52.041568 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear)
Feb  9 00:15:52.041581 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Feb  9 00:15:52.041605 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Feb  9 00:15:52.041617 kernel: Memory: 8081200K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved)
Feb  9 00:15:52.041632 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Feb  9 00:15:52.041644 kernel: ftrace: allocating 34475 entries in 135 pages
Feb  9 00:15:52.041666 kernel: ftrace: allocated 135 pages with 4 groups
Feb  9 00:15:52.041680 kernel: rcu: Hierarchical RCU implementation.
Feb  9 00:15:52.041694 kernel: rcu:         RCU event tracing is enabled.
Feb  9 00:15:52.041707 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Feb  9 00:15:52.041719 kernel:         Rude variant of Tasks RCU enabled.
Feb  9 00:15:52.041732 kernel:         Tracing variant of Tasks RCU enabled.
Feb  9 00:15:52.041745 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Feb  9 00:15:52.041773 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Feb  9 00:15:52.041786 kernel: Using NULL legacy PIC
Feb  9 00:15:52.041802 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0
Feb  9 00:15:52.041815 kernel: Console: colour dummy device 80x25
Feb  9 00:15:52.041828 kernel: printk: console [tty1] enabled
Feb  9 00:15:52.041841 kernel: printk: console [ttyS0] enabled
Feb  9 00:15:52.041855 kernel: printk: bootconsole [earlyser0] disabled
Feb  9 00:15:52.041871 kernel: ACPI: Core revision 20210730
Feb  9 00:15:52.041883 kernel: Failed to register legacy timer interrupt
Feb  9 00:15:52.041897 kernel: APIC: Switch to symmetric I/O mode setup
Feb  9 00:15:52.041910 kernel: Hyper-V: Using IPI hypercalls
Feb  9 00:15:52.041923 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905)
Feb  9 00:15:52.041936 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Feb  9 00:15:52.041949 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Feb  9 00:15:52.041962 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Feb  9 00:15:52.041975 kernel: Spectre V2 : Mitigation: Retpolines
Feb  9 00:15:52.046414 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Feb  9 00:15:52.046443 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Feb  9 00:15:52.046461 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
Feb  9 00:15:52.046475 kernel: RETBleed: Vulnerable
Feb  9 00:15:52.046488 kernel: Speculative Store Bypass: Vulnerable
Feb  9 00:15:52.046501 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode
Feb  9 00:15:52.046514 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode
Feb  9 00:15:52.046527 kernel: GDS: Unknown: Dependent on hypervisor status
Feb  9 00:15:52.046540 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Feb  9 00:15:52.046553 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Feb  9 00:15:52.046567 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Feb  9 00:15:52.046583 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Feb  9 00:15:52.046596 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Feb  9 00:15:52.046609 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Feb  9 00:15:52.046623 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Feb  9 00:15:52.046636 kernel: x86/fpu: xstate_offset[5]:  832, xstate_sizes[5]:   64
Feb  9 00:15:52.046649 kernel: x86/fpu: xstate_offset[6]:  896, xstate_sizes[6]:  512
Feb  9 00:15:52.046662 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024
Feb  9 00:15:52.046675 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format.
Feb  9 00:15:52.046688 kernel: Freeing SMP alternatives memory: 32K
Feb  9 00:15:52.046701 kernel: pid_max: default: 32768 minimum: 301
Feb  9 00:15:52.046714 kernel: LSM: Security Framework initializing
Feb  9 00:15:52.046727 kernel: SELinux:  Initializing.
Feb  9 00:15:52.046742 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear)
Feb  9 00:15:52.046756 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear)
Feb  9 00:15:52.046769 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7)
Feb  9 00:15:52.046783 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Feb  9 00:15:52.046796 kernel: signal: max sigframe size: 3632
Feb  9 00:15:52.046809 kernel: rcu: Hierarchical SRCU implementation.
Feb  9 00:15:52.046823 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Feb  9 00:15:52.046836 kernel: smp: Bringing up secondary CPUs ...
Feb  9 00:15:52.046849 kernel: x86: Booting SMP configuration:
Feb  9 00:15:52.046862 kernel: .... node  #0, CPUs:      #1
Feb  9 00:15:52.046878 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
Feb  9 00:15:52.046892 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Feb  9 00:15:52.046905 kernel: smp: Brought up 1 node, 2 CPUs
Feb  9 00:15:52.046918 kernel: smpboot: Max logical packages: 1
Feb  9 00:15:52.046932 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS)
Feb  9 00:15:52.046945 kernel: devtmpfs: initialized
Feb  9 00:15:52.046958 kernel: x86/mm: Memory block size: 128MB
Feb  9 00:15:52.046971 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes)
Feb  9 00:15:52.046997 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Feb  9 00:15:52.047011 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Feb  9 00:15:52.047025 kernel: pinctrl core: initialized pinctrl subsystem
Feb  9 00:15:52.047038 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Feb  9 00:15:52.047051 kernel: audit: initializing netlink subsys (disabled)
Feb  9 00:15:52.047065 kernel: audit: type=2000 audit(1707437750.023:1): state=initialized audit_enabled=0 res=1
Feb  9 00:15:52.047078 kernel: thermal_sys: Registered thermal governor 'step_wise'
Feb  9 00:15:52.047091 kernel: thermal_sys: Registered thermal governor 'user_space'
Feb  9 00:15:52.047105 kernel: cpuidle: using governor menu
Feb  9 00:15:52.047121 kernel: ACPI: bus type PCI registered
Feb  9 00:15:52.047134 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Feb  9 00:15:52.047147 kernel: dca service started, version 1.12.1
Feb  9 00:15:52.047161 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Feb  9 00:15:52.047174 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Feb  9 00:15:52.047187 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Feb  9 00:15:52.047201 kernel: ACPI: Added _OSI(Module Device)
Feb  9 00:15:52.047214 kernel: ACPI: Added _OSI(Processor Device)
Feb  9 00:15:52.047227 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Feb  9 00:15:52.047243 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Feb  9 00:15:52.047256 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Feb  9 00:15:52.047269 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Feb  9 00:15:52.047283 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Feb  9 00:15:52.047296 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Feb  9 00:15:52.047309 kernel: ACPI: Interpreter enabled
Feb  9 00:15:52.047322 kernel: ACPI: PM: (supports S0 S5)
Feb  9 00:15:52.047336 kernel: ACPI: Using IOAPIC for interrupt routing
Feb  9 00:15:52.047349 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Feb  9 00:15:52.047365 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F
Feb  9 00:15:52.047378 kernel: iommu: Default domain type: Translated 
Feb  9 00:15:52.047391 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Feb  9 00:15:52.047405 kernel: vgaarb: loaded
Feb  9 00:15:52.047418 kernel: pps_core: LinuxPPS API ver. 1 registered
Feb  9 00:15:52.047431 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Feb  9 00:15:52.047445 kernel: PTP clock support registered
Feb  9 00:15:52.047458 kernel: Registered efivars operations
Feb  9 00:15:52.047471 kernel: PCI: Using ACPI for IRQ routing
Feb  9 00:15:52.047484 kernel: PCI: System does not support PCI
Feb  9 00:15:52.047499 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page
Feb  9 00:15:52.047513 kernel: VFS: Disk quotas dquot_6.6.0
Feb  9 00:15:52.047527 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Feb  9 00:15:52.047540 kernel: pnp: PnP ACPI init
Feb  9 00:15:52.047553 kernel: pnp: PnP ACPI: found 3 devices
Feb  9 00:15:52.047566 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Feb  9 00:15:52.047580 kernel: NET: Registered PF_INET protocol family
Feb  9 00:15:52.047593 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Feb  9 00:15:52.047609 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear)
Feb  9 00:15:52.047622 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Feb  9 00:15:52.047636 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear)
Feb  9 00:15:52.047649 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear)
Feb  9 00:15:52.047662 kernel: TCP: Hash tables configured (established 65536 bind 65536)
Feb  9 00:15:52.047676 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear)
Feb  9 00:15:52.047689 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear)
Feb  9 00:15:52.047702 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Feb  9 00:15:52.047715 kernel: NET: Registered PF_XDP protocol family
Feb  9 00:15:52.047731 kernel: PCI: CLS 0 bytes, default 64
Feb  9 00:15:52.047744 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Feb  9 00:15:52.047758 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB)
Feb  9 00:15:52.047771 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Feb  9 00:15:52.047784 kernel: Initialise system trusted keyrings
Feb  9 00:15:52.047798 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0
Feb  9 00:15:52.047811 kernel: Key type asymmetric registered
Feb  9 00:15:52.047824 kernel: Asymmetric key parser 'x509' registered
Feb  9 00:15:52.047837 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Feb  9 00:15:52.047852 kernel: io scheduler mq-deadline registered
Feb  9 00:15:52.047866 kernel: io scheduler kyber registered
Feb  9 00:15:52.047879 kernel: io scheduler bfq registered
Feb  9 00:15:52.047892 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Feb  9 00:15:52.047905 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Feb  9 00:15:52.047919 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Feb  9 00:15:52.047932 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Feb  9 00:15:52.047945 kernel: i8042: PNP: No PS/2 controller found.
Feb  9 00:15:52.048124 kernel: rtc_cmos 00:02: registered as rtc0
Feb  9 00:15:52.048230 kernel: rtc_cmos 00:02: setting system clock to 2024-02-09T00:15:51 UTC (1707437751)
Feb  9 00:15:52.048339 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram
Feb  9 00:15:52.048356 kernel: fail to initialize ptp_kvm
Feb  9 00:15:52.048371 kernel: intel_pstate: CPU model not supported
Feb  9 00:15:52.048386 kernel: efifb: probing for efifb
Feb  9 00:15:52.048397 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k
Feb  9 00:15:52.048408 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1
Feb  9 00:15:52.048419 kernel: efifb: scrolling: redraw
Feb  9 00:15:52.048435 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
Feb  9 00:15:52.048450 kernel: Console: switching to colour frame buffer device 128x48
Feb  9 00:15:52.048463 kernel: fb0: EFI VGA frame buffer device
Feb  9 00:15:52.048476 kernel: pstore: Registered efi as persistent store backend
Feb  9 00:15:52.048491 kernel: NET: Registered PF_INET6 protocol family
Feb  9 00:15:52.048503 kernel: Segment Routing with IPv6
Feb  9 00:15:52.048517 kernel: In-situ OAM (IOAM) with IPv6
Feb  9 00:15:52.048532 kernel: NET: Registered PF_PACKET protocol family
Feb  9 00:15:52.048544 kernel: Key type dns_resolver registered
Feb  9 00:15:52.048562 kernel: IPI shorthand broadcast: enabled
Feb  9 00:15:52.048577 kernel: sched_clock: Marking stable (771428300, 22787100)->(1001656500, -207441100)
Feb  9 00:15:52.048591 kernel: registered taskstats version 1
Feb  9 00:15:52.048606 kernel: Loading compiled-in X.509 certificates
Feb  9 00:15:52.048620 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6'
Feb  9 00:15:52.048633 kernel: Key type .fscrypt registered
Feb  9 00:15:52.048646 kernel: Key type fscrypt-provisioning registered
Feb  9 00:15:52.048661 kernel: pstore: Using crash dump compression: deflate
Feb  9 00:15:52.048678 kernel: ima: No TPM chip found, activating TPM-bypass!
Feb  9 00:15:52.048689 kernel: ima: Allocated hash algorithm: sha1
Feb  9 00:15:52.048701 kernel: ima: No architecture policies found
Feb  9 00:15:52.048714 kernel: Freeing unused kernel image (initmem) memory: 45496K
Feb  9 00:15:52.048727 kernel: Write protecting the kernel read-only data: 28672k
Feb  9 00:15:52.048739 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Feb  9 00:15:52.048769 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K
Feb  9 00:15:52.048780 kernel: Run /init as init process
Feb  9 00:15:52.048787 kernel:   with arguments:
Feb  9 00:15:52.048795 kernel:     /init
Feb  9 00:15:52.048807 kernel:   with environment:
Feb  9 00:15:52.048815 kernel:     HOME=/
Feb  9 00:15:52.048822 kernel:     TERM=linux
Feb  9 00:15:52.048829 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Feb  9 00:15:52.048842 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Feb  9 00:15:52.048852 systemd[1]: Detected virtualization microsoft.
Feb  9 00:15:52.048863 systemd[1]: Detected architecture x86-64.
Feb  9 00:15:52.048872 systemd[1]: Running in initrd.
Feb  9 00:15:52.048880 systemd[1]: No hostname configured, using default hostname.
Feb  9 00:15:52.048888 systemd[1]: Hostname set to <localhost>.
Feb  9 00:15:52.048899 systemd[1]: Initializing machine ID from random generator.
Feb  9 00:15:52.048907 systemd[1]: Queued start job for default target initrd.target.
Feb  9 00:15:52.048917 systemd[1]: Started systemd-ask-password-console.path.
Feb  9 00:15:52.048924 systemd[1]: Reached target cryptsetup.target.
Feb  9 00:15:52.048934 systemd[1]: Reached target paths.target.
Feb  9 00:15:52.048942 systemd[1]: Reached target slices.target.
Feb  9 00:15:52.048955 systemd[1]: Reached target swap.target.
Feb  9 00:15:52.048963 systemd[1]: Reached target timers.target.
Feb  9 00:15:52.048974 systemd[1]: Listening on iscsid.socket.
Feb  9 00:15:52.048999 systemd[1]: Listening on iscsiuio.socket.
Feb  9 00:15:52.049008 systemd[1]: Listening on systemd-journald-audit.socket.
Feb  9 00:15:52.049016 systemd[1]: Listening on systemd-journald-dev-log.socket.
Feb  9 00:15:52.049027 systemd[1]: Listening on systemd-journald.socket.
Feb  9 00:15:52.049040 systemd[1]: Listening on systemd-networkd.socket.
Feb  9 00:15:52.049048 systemd[1]: Listening on systemd-udevd-control.socket.
Feb  9 00:15:52.049058 systemd[1]: Listening on systemd-udevd-kernel.socket.
Feb  9 00:15:52.049067 systemd[1]: Reached target sockets.target.
Feb  9 00:15:52.049080 systemd[1]: Starting kmod-static-nodes.service...
Feb  9 00:15:52.049087 systemd[1]: Finished network-cleanup.service.
Feb  9 00:15:52.049095 systemd[1]: Starting systemd-fsck-usr.service...
Feb  9 00:15:52.049106 systemd[1]: Starting systemd-journald.service...
Feb  9 00:15:52.049116 systemd[1]: Starting systemd-modules-load.service...
Feb  9 00:15:52.049127 systemd[1]: Starting systemd-resolved.service...
Feb  9 00:15:52.049134 systemd[1]: Starting systemd-vconsole-setup.service...
Feb  9 00:15:52.049142 systemd[1]: Finished kmod-static-nodes.service.
Feb  9 00:15:52.049153 systemd-journald[183]: Journal started
Feb  9 00:15:52.049207 systemd-journald[183]: Runtime Journal (/run/log/journal/e4269b9f353d43a88c1daa02c8bfdd49) is 8.0M, max 159.0M, 151.0M free.
Feb  9 00:15:52.037002 systemd-modules-load[184]: Inserted module 'overlay'
Feb  9 00:15:52.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.069994 kernel: audit: type=1130 audit(1707437752.057:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.070013 systemd[1]: Started systemd-journald.service.
Feb  9 00:15:52.089625 systemd-resolved[185]: Positive Trust Anchors:
Feb  9 00:15:52.089793 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Feb  9 00:15:52.089845 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Feb  9 00:15:52.148927 kernel: audit: type=1130 audit(1707437752.089:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.148961 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Feb  9 00:15:52.148996 kernel: audit: type=1130 audit(1707437752.093:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.149015 kernel: Bridge firewalling registered
Feb  9 00:15:52.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.090514 systemd[1]: Finished systemd-fsck-usr.service.
Feb  9 00:15:52.170351 kernel: audit: type=1130 audit(1707437752.127:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.094418 systemd[1]: Finished systemd-vconsole-setup.service.
Feb  9 00:15:52.196082 kernel: audit: type=1130 audit(1707437752.130:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.112529 systemd-resolved[185]: Defaulting to hostname 'linux'.
Feb  9 00:15:52.128103 systemd[1]: Started systemd-resolved.service.
Feb  9 00:15:52.131898 systemd[1]: Reached target nss-lookup.target.
Feb  9 00:15:52.164571 systemd-modules-load[184]: Inserted module 'br_netfilter'
Feb  9 00:15:52.166869 systemd[1]: Starting dracut-cmdline-ask.service...
Feb  9 00:15:52.196348 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Feb  9 00:15:52.213310 kernel: SCSI subsystem initialized
Feb  9 00:15:52.223708 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Feb  9 00:15:52.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.241150 kernel: audit: type=1130 audit(1707437752.222:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.241185 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Feb  9 00:15:52.248452 systemd[1]: Finished dracut-cmdline-ask.service.
Feb  9 00:15:52.260449 kernel: device-mapper: uevent: version 1.0.3
Feb  9 00:15:52.260475 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Feb  9 00:15:52.261444 systemd[1]: Starting dracut-cmdline.service...
Feb  9 00:15:52.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.278291 systemd-modules-load[184]: Inserted module 'dm_multipath'
Feb  9 00:15:52.295515 kernel: audit: type=1130 audit(1707437752.253:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.295553 kernel: audit: type=1130 audit(1707437752.280:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.281199 systemd[1]: Finished systemd-modules-load.service.
Feb  9 00:15:52.301035 dracut-cmdline[200]: dracut-dracut-053
Feb  9 00:15:52.283453 systemd[1]: Starting systemd-sysctl.service...
Feb  9 00:15:52.305370 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9
Feb  9 00:15:52.321158 systemd[1]: Finished systemd-sysctl.service.
Feb  9 00:15:52.338592 kernel: audit: type=1130 audit(1707437752.322:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.368005 kernel: Loading iSCSI transport class v2.0-870.
Feb  9 00:15:52.382003 kernel: iscsi: registered transport (tcp)
Feb  9 00:15:52.406041 kernel: iscsi: registered transport (qla4xxx)
Feb  9 00:15:52.406095 kernel: QLogic iSCSI HBA Driver
Feb  9 00:15:52.435001 systemd[1]: Finished dracut-cmdline.service.
Feb  9 00:15:52.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.438236 systemd[1]: Starting dracut-pre-udev.service...
Feb  9 00:15:52.495014 kernel: raid6: avx512x4 gen() 18298 MB/s
Feb  9 00:15:52.514998 kernel: raid6: avx512x4 xor()  8397 MB/s
Feb  9 00:15:52.534999 kernel: raid6: avx512x2 gen() 18285 MB/s
Feb  9 00:15:52.555001 kernel: raid6: avx512x2 xor() 29920 MB/s
Feb  9 00:15:52.574994 kernel: raid6: avx512x1 gen() 18209 MB/s
Feb  9 00:15:52.594995 kernel: raid6: avx512x1 xor() 26979 MB/s
Feb  9 00:15:52.615996 kernel: raid6: avx2x4   gen() 18159 MB/s
Feb  9 00:15:52.635995 kernel: raid6: avx2x4   xor()  7918 MB/s
Feb  9 00:15:52.655994 kernel: raid6: avx2x2   gen() 18140 MB/s
Feb  9 00:15:52.676997 kernel: raid6: avx2x2   xor() 22275 MB/s
Feb  9 00:15:52.696994 kernel: raid6: avx2x1   gen() 13845 MB/s
Feb  9 00:15:52.716993 kernel: raid6: avx2x1   xor() 19487 MB/s
Feb  9 00:15:52.736995 kernel: raid6: sse2x4   gen() 11731 MB/s
Feb  9 00:15:52.756993 kernel: raid6: sse2x4   xor()  7330 MB/s
Feb  9 00:15:52.776993 kernel: raid6: sse2x2   gen() 12890 MB/s
Feb  9 00:15:52.796993 kernel: raid6: sse2x2   xor()  7529 MB/s
Feb  9 00:15:52.816992 kernel: raid6: sse2x1   gen() 11657 MB/s
Feb  9 00:15:52.840372 kernel: raid6: sse2x1   xor()  5931 MB/s
Feb  9 00:15:52.840406 kernel: raid6: using algorithm avx512x4 gen() 18298 MB/s
Feb  9 00:15:52.840419 kernel: raid6: .... xor() 8397 MB/s, rmw enabled
Feb  9 00:15:52.843723 kernel: raid6: using avx512x2 recovery algorithm
Feb  9 00:15:52.864002 kernel: xor: automatically using best checksumming function   avx       
Feb  9 00:15:52.959008 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Feb  9 00:15:52.966805 systemd[1]: Finished dracut-pre-udev.service.
Feb  9 00:15:52.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.971000 audit: BPF prog-id=7 op=LOAD
Feb  9 00:15:52.971000 audit: BPF prog-id=8 op=LOAD
Feb  9 00:15:52.972854 systemd[1]: Starting systemd-udevd.service...
Feb  9 00:15:52.987575 systemd-udevd[384]: Using default interface naming scheme 'v252'.
Feb  9 00:15:52.994576 systemd[1]: Started systemd-udevd.service.
Feb  9 00:15:52.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:52.999884 systemd[1]: Starting dracut-pre-trigger.service...
Feb  9 00:15:53.018188 dracut-pre-trigger[403]: rd.md=0: removing MD RAID activation
Feb  9 00:15:53.046694 systemd[1]: Finished dracut-pre-trigger.service.
Feb  9 00:15:53.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:53.049904 systemd[1]: Starting systemd-udev-trigger.service...
Feb  9 00:15:53.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:53.086244 systemd[1]: Finished systemd-udev-trigger.service.
Feb  9 00:15:53.144003 kernel: cryptd: max_cpu_qlen set to 1000
Feb  9 00:15:53.156237 kernel: hv_vmbus: Vmbus version:5.2
Feb  9 00:15:53.170005 kernel: hv_vmbus: registering driver hyperv_keyboard
Feb  9 00:15:53.180999 kernel: AVX2 version of gcm_enc/dec engaged.
Feb  9 00:15:53.196818 kernel: hv_vmbus: registering driver hv_storvsc
Feb  9 00:15:53.196859 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0
Feb  9 00:15:53.202003 kernel: AES CTR mode by8 optimization enabled
Feb  9 00:15:53.208005 kernel: hid: raw HID events driver (C) Jiri Kosina
Feb  9 00:15:53.208038 kernel: scsi host1: storvsc_host_t
Feb  9 00:15:53.211005 kernel: scsi host0: storvsc_host_t
Feb  9 00:15:53.212023 kernel: scsi 0:0:0:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Feb  9 00:15:53.212073 kernel: scsi 0:0:0:2: CD-ROM            Msft     Virtual DVD-ROM  1.0  PQ: 0 ANSI: 0
Feb  9 00:15:53.232002 kernel: hv_vmbus: registering driver hid_hyperv
Feb  9 00:15:53.233000 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1
Feb  9 00:15:53.233044 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on 
Feb  9 00:15:53.235998 kernel: hv_vmbus: registering driver hv_netvsc
Feb  9 00:15:53.270451 kernel: sr 0:0:0:2: [sr0] scsi-1 drive
Feb  9 00:15:53.270734 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20
Feb  9 00:15:53.280381 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB)
Feb  9 00:15:53.280655 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks
Feb  9 00:15:53.280792 kernel: sd 0:0:0:0: [sda] Write Protect is off
Feb  9 00:15:53.284005 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0
Feb  9 00:15:53.284232 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00
Feb  9 00:15:53.290002 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA
Feb  9 00:15:53.297006 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Feb  9 00:15:53.301622 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
Feb  9 00:15:53.458474 kernel: hv_netvsc 000d3ab0-ffbc-000d-3ab0-ffbc000d3ab0 eth0: VF slot 1 added
Feb  9 00:15:53.468384 kernel: hv_vmbus: registering driver hv_pci
Feb  9 00:15:53.468416 kernel: hv_pci ef96af84-8cb8-4f7e-9952-c5ee4ec90e79: PCI VMBus probing: Using version 0x10004
Feb  9 00:15:53.485144 kernel: hv_pci ef96af84-8cb8-4f7e-9952-c5ee4ec90e79: PCI host bridge to bus 8cb8:00
Feb  9 00:15:53.485300 kernel: pci_bus 8cb8:00: root bus resource [mem 0xfe0000000-0xfe00fffff window]
Feb  9 00:15:53.485433 kernel: pci_bus 8cb8:00: No busn resource found for root bus, will use [bus 00-ff]
Feb  9 00:15:53.496081 kernel: pci 8cb8:00:02.0: [15b3:1016] type 00 class 0x020000
Feb  9 00:15:53.505092 kernel: pci 8cb8:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref]
Feb  9 00:15:53.522074 kernel: pci 8cb8:00:02.0: enabling Extended Tags
Feb  9 00:15:53.535128 kernel: pci 8cb8:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 8cb8:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link)
Feb  9 00:15:53.544442 kernel: pci_bus 8cb8:00: busn_res: [bus 00-ff] end is updated to 00
Feb  9 00:15:53.544608 kernel: pci 8cb8:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref]
Feb  9 00:15:53.638007 kernel: mlx5_core 8cb8:00:02.0: firmware version: 14.30.1224
Feb  9 00:15:53.797120 kernel: mlx5_core 8cb8:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0)
Feb  9 00:15:53.889968 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Feb  9 00:15:53.953447 kernel: mlx5_core 8cb8:00:02.0: Supported tc offload range - chains: 1, prios: 1
Feb  9 00:15:53.953693 kernel: mlx5_core 8cb8:00:02.0: mlx5e_tc_post_act_init:40:(pid 368): firmware level support is missing
Feb  9 00:15:53.962014 kernel: hv_netvsc 000d3ab0-ffbc-000d-3ab0-ffbc000d3ab0 eth0: VF registering: eth1
Feb  9 00:15:53.962193 kernel: mlx5_core 8cb8:00:02.0 eth1: joined to eth0
Feb  9 00:15:53.978027 kernel: mlx5_core 8cb8:00:02.0 enP36024s1: renamed from eth1
Feb  9 00:15:54.011001 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (447)
Feb  9 00:15:54.024252 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Feb  9 00:15:54.104243 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Feb  9 00:15:54.127238 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Feb  9 00:15:54.130162 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Feb  9 00:15:54.137417 systemd[1]: Starting disk-uuid.service...
Feb  9 00:15:55.162012 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Feb  9 00:15:55.162949 disk-uuid[560]: The operation has completed successfully.
Feb  9 00:15:55.228766 systemd[1]: disk-uuid.service: Deactivated successfully.
Feb  9 00:15:55.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.228870 systemd[1]: Finished disk-uuid.service.
Feb  9 00:15:55.240872 systemd[1]: Starting verity-setup.service...
Feb  9 00:15:55.275006 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2"
Feb  9 00:15:55.515154 systemd[1]: Found device dev-mapper-usr.device.
Feb  9 00:15:55.522236 systemd[1]: Finished verity-setup.service.
Feb  9 00:15:55.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.526955 systemd[1]: Mounting sysusr-usr.mount...
Feb  9 00:15:55.600016 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Feb  9 00:15:55.599806 systemd[1]: Mounted sysusr-usr.mount.
Feb  9 00:15:55.603744 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Feb  9 00:15:55.608151 systemd[1]: Starting ignition-setup.service...
Feb  9 00:15:55.613021 systemd[1]: Starting parse-ip-for-networkd.service...
Feb  9 00:15:55.629029 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 00:15:55.629077 kernel: BTRFS info (device sda6): using free space tree
Feb  9 00:15:55.629090 kernel: BTRFS info (device sda6): has skinny extents
Feb  9 00:15:55.682436 systemd[1]: Finished parse-ip-for-networkd.service.
Feb  9 00:15:55.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.686000 audit: BPF prog-id=9 op=LOAD
Feb  9 00:15:55.688296 systemd[1]: Starting systemd-networkd.service...
Feb  9 00:15:55.713424 systemd-networkd[801]: lo: Link UP
Feb  9 00:15:55.713435 systemd-networkd[801]: lo: Gained carrier
Feb  9 00:15:55.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.713951 systemd-networkd[801]: Enumeration completed
Feb  9 00:15:55.714309 systemd[1]: Started systemd-networkd.service.
Feb  9 00:15:55.716610 systemd-networkd[801]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 00:15:55.717872 systemd[1]: Reached target network.target.
Feb  9 00:15:55.722683 systemd[1]: Starting iscsiuio.service...
Feb  9 00:15:55.742205 systemd[1]: Started iscsiuio.service.
Feb  9 00:15:55.745160 systemd[1]: Starting iscsid.service...
Feb  9 00:15:55.764169 iscsid[809]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Feb  9 00:15:55.764169 iscsid[809]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log
Feb  9 00:15:55.764169 iscsid[809]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Feb  9 00:15:55.764169 iscsid[809]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Feb  9 00:15:55.764169 iscsid[809]: If using hardware iscsi like qla4xxx this message can be ignored.
Feb  9 00:15:55.764169 iscsid[809]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Feb  9 00:15:55.764169 iscsid[809]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Feb  9 00:15:55.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.755551 systemd[1]: Started iscsid.service.
Feb  9 00:15:55.758421 systemd[1]: Starting dracut-initqueue.service...
Feb  9 00:15:55.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.806418 systemd[1]: Finished dracut-initqueue.service.
Feb  9 00:15:55.809102 systemd[1]: Reached target remote-fs-pre.target.
Feb  9 00:15:55.811443 systemd[1]: Reached target remote-cryptsetup.target.
Feb  9 00:15:55.813872 systemd[1]: Reached target remote-fs.target.
Feb  9 00:15:55.816764 systemd[1]: Starting dracut-pre-mount.service...
Feb  9 00:15:55.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:55.837821 systemd[1]: Finished dracut-pre-mount.service.
Feb  9 00:15:55.954365 systemd[1]: mnt-oem.mount: Deactivated successfully.
Feb  9 00:15:55.999000 kernel: mlx5_core 8cb8:00:02.0 enP36024s1: Link up
Feb  9 00:15:56.153735 systemd[1]: Finished ignition-setup.service.
Feb  9 00:15:56.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:56.157105 systemd[1]: Starting ignition-fetch-offline.service...
Feb  9 00:15:56.840385 kernel: hv_netvsc 000d3ab0-ffbc-000d-3ab0-ffbc000d3ab0 eth0: Data path switched to VF: enP36024s1
Feb  9 00:15:56.840603 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 00:15:56.844341 systemd-networkd[801]: enP36024s1: Link UP
Feb  9 00:15:56.844617 systemd-networkd[801]: eth0: Link UP
Feb  9 00:15:56.849131 systemd-networkd[801]: eth0: Gained carrier
Feb  9 00:15:56.856154 systemd-networkd[801]: enP36024s1: Gained carrier
Feb  9 00:15:56.883151 systemd-networkd[801]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16
Feb  9 00:15:58.198207 systemd-networkd[801]: eth0: Gained IPv6LL
Feb  9 00:15:59.495089 ignition[828]: Ignition 2.14.0
Feb  9 00:15:59.495105 ignition[828]: Stage: fetch-offline
Feb  9 00:15:59.495200 ignition[828]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 00:15:59.495252 ignition[828]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Feb  9 00:15:59.608358 ignition[828]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Feb  9 00:15:59.608556 ignition[828]: parsed url from cmdline: ""
Feb  9 00:15:59.611472 ignition[828]: no config URL provided
Feb  9 00:15:59.611483 ignition[828]: reading system config file "/usr/lib/ignition/user.ign"
Feb  9 00:15:59.611497 ignition[828]: no config at "/usr/lib/ignition/user.ign"
Feb  9 00:15:59.611505 ignition[828]: failed to fetch config: resource requires networking
Feb  9 00:15:59.612115 ignition[828]: Ignition finished successfully
Feb  9 00:15:59.623543 systemd[1]: Finished ignition-fetch-offline.service.
Feb  9 00:15:59.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:59.626888 systemd[1]: Starting ignition-fetch.service...
Feb  9 00:15:59.647817 kernel: kauditd_printk_skb: 18 callbacks suppressed
Feb  9 00:15:59.647851 kernel: audit: type=1130 audit(1707437759.625:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:59.653942 ignition[834]: Ignition 2.14.0
Feb  9 00:15:59.653951 ignition[834]: Stage: fetch
Feb  9 00:15:59.654104 ignition[834]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 00:15:59.654138 ignition[834]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Feb  9 00:15:59.664668 ignition[834]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Feb  9 00:15:59.667567 ignition[834]: parsed url from cmdline: ""
Feb  9 00:15:59.667575 ignition[834]: no config URL provided
Feb  9 00:15:59.667583 ignition[834]: reading system config file "/usr/lib/ignition/user.ign"
Feb  9 00:15:59.667595 ignition[834]: no config at "/usr/lib/ignition/user.ign"
Feb  9 00:15:59.667634 ignition[834]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1
Feb  9 00:15:59.771065 ignition[834]: GET result: OK
Feb  9 00:15:59.771130 ignition[834]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty)
Feb  9 00:15:59.898080 ignition[834]: opening config device: "/dev/sr0"
Feb  9 00:15:59.898774 ignition[834]: getting drive status for "/dev/sr0"
Feb  9 00:15:59.898838 ignition[834]: drive status: OK
Feb  9 00:15:59.898875 ignition[834]: mounting config device
Feb  9 00:15:59.898898 ignition[834]: op(1): [started]  mounting "/dev/sr0" at "/tmp/ignition-azure2822006130"
Feb  9 00:15:59.924555 ignition[834]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure2822006130"
Feb  9 00:15:59.927781 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/10 00:00 (1000)
Feb  9 00:15:59.924688 ignition[834]: checking for config drive
Feb  9 00:15:59.925092 ignition[834]: reading config
Feb  9 00:15:59.925450 ignition[834]: op(2): [started]  unmounting "/dev/sr0" at "/tmp/ignition-azure2822006130"
Feb  9 00:15:59.928039 ignition[834]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure2822006130"
Feb  9 00:15:59.928064 ignition[834]: config has been read from custom data
Feb  9 00:15:59.928109 ignition[834]: parsing config with SHA512: 00e0aaec39271a4f6066a1f020e0173bdea0d50421ef3e1e06e877d5b8b942911fa1b680c004d82f3acc42563e0729d67f7dfb51b4c3781ff4f3e3cbfbb43e49
Feb  9 00:15:59.945574 unknown[834]: fetched base config from "system"
Feb  9 00:15:59.945722 unknown[834]: fetched base config from "system"
Feb  9 00:15:59.946554 ignition[834]: fetch: fetch complete
Feb  9 00:15:59.945727 unknown[834]: fetched user config from "azure"
Feb  9 00:15:59.946560 ignition[834]: fetch: fetch passed
Feb  9 00:15:59.946605 ignition[834]: Ignition finished successfully
Feb  9 00:15:59.958177 systemd[1]: Finished ignition-fetch.service.
Feb  9 00:15:59.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:59.961003 systemd[1]: Starting ignition-kargs.service...
Feb  9 00:15:59.977573 kernel: audit: type=1130 audit(1707437759.959:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:15:59.985907 ignition[843]: Ignition 2.14.0
Feb  9 00:15:59.985916 ignition[843]: Stage: kargs
Feb  9 00:15:59.986063 ignition[843]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 00:15:59.986094 ignition[843]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Feb  9 00:15:59.996108 ignition[843]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Feb  9 00:15:59.997263 ignition[843]: kargs: kargs passed
Feb  9 00:15:59.999029 systemd[1]: Finished ignition-kargs.service.
Feb  9 00:15:59.997301 ignition[843]: Ignition finished successfully
Feb  9 00:16:00.002017 systemd[1]: Starting ignition-disks.service...
Feb  9 00:16:00.010625 ignition[849]: Ignition 2.14.0
Feb  9 00:16:00.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.010630 ignition[849]: Stage: disks
Feb  9 00:16:00.025354 kernel: audit: type=1130 audit(1707437760.000:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.010728 ignition[849]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 00:16:00.010757 ignition[849]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Feb  9 00:16:00.028482 ignition[849]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Feb  9 00:16:00.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.031580 systemd[1]: Finished ignition-disks.service.
Feb  9 00:16:00.056734 kernel: audit: type=1130 audit(1707437760.030:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.030893 ignition[849]: disks: disks passed
Feb  9 00:16:00.031855 systemd[1]: Reached target initrd-root-device.target.
Feb  9 00:16:00.030950 ignition[849]: Ignition finished successfully
Feb  9 00:16:00.032166 systemd[1]: Reached target local-fs-pre.target.
Feb  9 00:16:00.032601 systemd[1]: Reached target local-fs.target.
Feb  9 00:16:00.032979 systemd[1]: Reached target sysinit.target.
Feb  9 00:16:00.033376 systemd[1]: Reached target basic.target.
Feb  9 00:16:00.034528 systemd[1]: Starting systemd-fsck-root.service...
Feb  9 00:16:00.115372 systemd-fsck[857]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks
Feb  9 00:16:00.120166 systemd[1]: Finished systemd-fsck-root.service.
Feb  9 00:16:00.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.126103 systemd[1]: Mounting sysroot.mount...
Feb  9 00:16:00.138440 kernel: audit: type=1130 audit(1707437760.124:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.151004 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Feb  9 00:16:00.151283 systemd[1]: Mounted sysroot.mount.
Feb  9 00:16:00.155465 systemd[1]: Reached target initrd-root-fs.target.
Feb  9 00:16:00.192509 systemd[1]: Mounting sysroot-usr.mount...
Feb  9 00:16:00.196156 systemd[1]: Starting flatcar-metadata-hostname.service...
Feb  9 00:16:00.202265 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Feb  9 00:16:00.202310 systemd[1]: Reached target ignition-diskful.target.
Feb  9 00:16:00.211879 systemd[1]: Mounted sysroot-usr.mount.
Feb  9 00:16:00.261891 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Feb  9 00:16:00.275298 systemd[1]: Starting initrd-setup-root.service...
Feb  9 00:16:00.277905 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (867)
Feb  9 00:16:00.290221 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 00:16:00.290268 kernel: BTRFS info (device sda6): using free space tree
Feb  9 00:16:00.290281 kernel: BTRFS info (device sda6): has skinny extents
Feb  9 00:16:00.298155 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Feb  9 00:16:00.302347 initrd-setup-root[872]: cut: /sysroot/etc/passwd: No such file or directory
Feb  9 00:16:00.329842 initrd-setup-root[898]: cut: /sysroot/etc/group: No such file or directory
Feb  9 00:16:00.335034 initrd-setup-root[906]: cut: /sysroot/etc/shadow: No such file or directory
Feb  9 00:16:00.353614 initrd-setup-root[914]: cut: /sysroot/etc/gshadow: No such file or directory
Feb  9 00:16:00.818496 systemd[1]: Finished initrd-setup-root.service.
Feb  9 00:16:00.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.824784 systemd[1]: Starting ignition-mount.service...
Feb  9 00:16:00.842573 kernel: audit: type=1130 audit(1707437760.823:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.843326 systemd[1]: Starting sysroot-boot.service...
Feb  9 00:16:00.865878 ignition[933]: INFO     : Ignition 2.14.0
Feb  9 00:16:00.869185 ignition[933]: INFO     : Stage: mount
Feb  9 00:16:00.869185 ignition[933]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 00:16:00.869185 ignition[933]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Feb  9 00:16:00.880378 ignition[933]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Feb  9 00:16:00.880378 ignition[933]: INFO     : mount: mount passed
Feb  9 00:16:00.880378 ignition[933]: INFO     : Ignition finished successfully
Feb  9 00:16:00.877814 systemd[1]: Finished ignition-mount.service.
Feb  9 00:16:00.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.891709 systemd[1]: Finished sysroot-boot.service.
Feb  9 00:16:00.921362 kernel: audit: type=1130 audit(1707437760.891:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.921385 kernel: audit: type=1130 audit(1707437760.906:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:00.925689 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Feb  9 00:16:00.925781 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Feb  9 00:16:01.632802 coreos-metadata[866]: Feb 09 00:16:01.632 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1
Feb  9 00:16:01.652680 coreos-metadata[866]: Feb 09 00:16:01.652 INFO Fetch successful
Feb  9 00:16:01.686922 coreos-metadata[866]: Feb 09 00:16:01.686 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1
Feb  9 00:16:01.701548 coreos-metadata[866]: Feb 09 00:16:01.701 INFO Fetch successful
Feb  9 00:16:01.717644 coreos-metadata[866]: Feb 09 00:16:01.717 INFO wrote hostname ci-3510.3.2-a-f6a0525c7f to /sysroot/etc/hostname
Feb  9 00:16:01.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:01.719446 systemd[1]: Finished flatcar-metadata-hostname.service.
Feb  9 00:16:01.741192 kernel: audit: type=1130 audit(1707437761.723:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:01.725218 systemd[1]: Starting ignition-files.service...
Feb  9 00:16:01.744434 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Feb  9 00:16:01.760015 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (945)
Feb  9 00:16:01.760044 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 00:16:01.768844 kernel: BTRFS info (device sda6): using free space tree
Feb  9 00:16:01.768870 kernel: BTRFS info (device sda6): has skinny extents
Feb  9 00:16:01.777613 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Feb  9 00:16:01.791213 ignition[964]: INFO     : Ignition 2.14.0
Feb  9 00:16:01.791213 ignition[964]: INFO     : Stage: files
Feb  9 00:16:01.795667 ignition[964]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 00:16:01.795667 ignition[964]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Feb  9 00:16:01.805394 ignition[964]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Feb  9 00:16:01.823401 ignition[964]: DEBUG    : files: compiled without relabeling support, skipping
Feb  9 00:16:01.827364 ignition[964]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Feb  9 00:16:01.827364 ignition[964]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Feb  9 00:16:01.890533 ignition[964]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Feb  9 00:16:01.894698 ignition[964]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Feb  9 00:16:01.913028 unknown[964]: wrote ssh authorized keys file for user: core
Feb  9 00:16:01.916016 ignition[964]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Feb  9 00:16:01.928060 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Feb  9 00:16:01.933494 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1
Feb  9 00:16:02.583429 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET result: OK
Feb  9 00:16:02.764815 ignition[964]: DEBUG    : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d
Feb  9 00:16:02.772646 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Feb  9 00:16:02.772646 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz"
Feb  9 00:16:02.772646 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1
Feb  9 00:16:03.272690 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET result: OK
Feb  9 00:16:03.368634 ignition[964]: DEBUG    : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449
Feb  9 00:16:03.376565 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz"
Feb  9 00:16:03.376565 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/opt/bin/kubeadm"
Feb  9 00:16:03.376565 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1
Feb  9 00:16:03.680061 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET result: OK
Feb  9 00:16:08.140398 ignition[964]: DEBUG    : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660
Feb  9 00:16:08.149039 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm"
Feb  9 00:16:08.149039 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubelet"
Feb  9 00:16:08.149039 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1
Feb  9 00:16:08.367253 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET result: OK
Feb  9 00:16:20.377310 ignition[964]: DEBUG    : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b
Feb  9 00:16:20.385693 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet"
Feb  9 00:16:20.385693 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/home/core/install.sh"
Feb  9 00:16:20.385693 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh"
Feb  9 00:16:20.385693 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/etc/docker/daemon.json"
Feb  9 00:16:20.385693 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json"
Feb  9 00:16:20.408232 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Feb  9 00:16:20.408232 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Feb  9 00:16:20.417369 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/etc/systemd/system/waagent.service"
Feb  9 00:16:20.417369 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 00:16:20.429884 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(a): op(b): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3786619414"
Feb  9 00:16:20.442224 ignition[964]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem3786619414": device or resource busy
Feb  9 00:16:20.442224 ignition[964]: ERROR    : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3786619414", trying btrfs: device or resource busy
Feb  9 00:16:20.442224 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(a): op(c): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3786619414"
Feb  9 00:16:20.459634 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (967)
Feb  9 00:16:20.455808 systemd[1]: mnt-oem3786619414.mount: Deactivated successfully.
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3786619414"
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(a): op(d): [started]  unmounting "/mnt/oem3786619414"
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3786619414"
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service"
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [started]  writing file "/sysroot/etc/systemd/system/nvidia.service"
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(e): op(f): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem878245584"
Feb  9 00:16:20.462681 ignition[964]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem878245584": device or resource busy
Feb  9 00:16:20.462681 ignition[964]: ERROR    : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem878245584", trying btrfs: device or resource busy
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(e): op(10): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem878245584"
Feb  9 00:16:20.462681 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem878245584"
Feb  9 00:16:20.574395 kernel: audit: type=1130 audit(1707437780.483:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.574429 kernel: audit: type=1130 audit(1707437780.518:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.574447 kernel: audit: type=1131 audit(1707437780.532:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.574469 kernel: audit: type=1130 audit(1707437780.555:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(e): op(11): [started]  unmounting "/mnt/oem878245584"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem878245584"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(12): [started]  processing unit "waagent.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(12): [finished] processing unit "waagent.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(13): [started]  processing unit "nvidia.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(13): [finished] processing unit "nvidia.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(14): [started]  processing unit "prepare-cni-plugins.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(14): op(15): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(14): [finished] processing unit "prepare-cni-plugins.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(16): [started]  processing unit "prepare-critools.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(16): op(17): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(16): [finished] processing unit "prepare-critools.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(18): [started]  setting preset to enabled for "waagent.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(18): [finished] setting preset to enabled for "waagent.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(19): [started]  setting preset to enabled for "nvidia.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(19): [finished] setting preset to enabled for "nvidia.service"
Feb  9 00:16:20.574658 ignition[964]: INFO     : files: op(1a): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Feb  9 00:16:20.682583 kernel: audit: type=1130 audit(1707437780.598:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.682625 kernel: audit: type=1131 audit(1707437780.610:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.478245 systemd[1]: mnt-oem878245584.mount: Deactivated successfully.
Feb  9 00:16:20.685307 ignition[964]: INFO     : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Feb  9 00:16:20.685307 ignition[964]: INFO     : files: op(1b): [started]  setting preset to enabled for "prepare-critools.service"
Feb  9 00:16:20.685307 ignition[964]: INFO     : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service"
Feb  9 00:16:20.685307 ignition[964]: INFO     : files: createResultFile: createFiles: op(1c): [started]  writing file "/sysroot/etc/.ignition-result.json"
Feb  9 00:16:20.685307 ignition[964]: INFO     : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json"
Feb  9 00:16:20.685307 ignition[964]: INFO     : files: files passed
Feb  9 00:16:20.685307 ignition[964]: INFO     : Ignition finished successfully
Feb  9 00:16:20.730249 kernel: audit: type=1130 audit(1707437780.709:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.480953 systemd[1]: Finished ignition-files.service.
Feb  9 00:16:20.732348 initrd-setup-root-after-ignition[989]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Feb  9 00:16:20.501102 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Feb  9 00:16:20.507830 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Feb  9 00:16:20.508578 systemd[1]: Starting ignition-quench.service...
Feb  9 00:16:20.519419 systemd[1]: ignition-quench.service: Deactivated successfully.
Feb  9 00:16:20.519509 systemd[1]: Finished ignition-quench.service.
Feb  9 00:16:20.549792 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Feb  9 00:16:20.556317 systemd[1]: Reached target ignition-complete.target.
Feb  9 00:16:20.575163 systemd[1]: Starting initrd-parse-etc.service...
Feb  9 00:16:20.595525 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Feb  9 00:16:20.595612 systemd[1]: Finished initrd-parse-etc.service.
Feb  9 00:16:20.611099 systemd[1]: Reached target initrd-fs.target.
Feb  9 00:16:20.625099 systemd[1]: Reached target initrd.target.
Feb  9 00:16:20.633685 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Feb  9 00:16:20.696575 systemd[1]: Starting dracut-pre-pivot.service...
Feb  9 00:16:20.704567 systemd[1]: Finished dracut-pre-pivot.service.
Feb  9 00:16:20.724697 systemd[1]: Starting initrd-cleanup.service...
Feb  9 00:16:20.770404 systemd[1]: Stopped target nss-lookup.target.
Feb  9 00:16:20.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.774166 systemd[1]: Stopped target remote-cryptsetup.target.
Feb  9 00:16:20.804283 kernel: audit: type=1131 audit(1707437780.786:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.778481 systemd[1]: Stopped target timers.target.
Feb  9 00:16:20.782405 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Feb  9 00:16:20.782514 systemd[1]: Stopped dracut-pre-pivot.service.
Feb  9 00:16:20.798851 systemd[1]: Stopped target initrd.target.
Feb  9 00:16:20.804415 systemd[1]: Stopped target basic.target.
Feb  9 00:16:20.808432 systemd[1]: Stopped target ignition-complete.target.
Feb  9 00:16:20.813251 systemd[1]: Stopped target ignition-diskful.target.
Feb  9 00:16:20.817729 systemd[1]: Stopped target initrd-root-device.target.
Feb  9 00:16:20.822136 systemd[1]: Stopped target remote-fs.target.
Feb  9 00:16:20.826182 systemd[1]: Stopped target remote-fs-pre.target.
Feb  9 00:16:20.830638 systemd[1]: Stopped target sysinit.target.
Feb  9 00:16:20.834873 systemd[1]: Stopped target local-fs.target.
Feb  9 00:16:20.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.839184 systemd[1]: Stopped target local-fs-pre.target.
Feb  9 00:16:20.872877 kernel: audit: type=1131 audit(1707437780.851:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.843146 systemd[1]: Stopped target swap.target.
Feb  9 00:16:20.847222 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Feb  9 00:16:20.894389 kernel: audit: type=1131 audit(1707437780.876:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.847366 systemd[1]: Stopped dracut-pre-mount.service.
Feb  9 00:16:20.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.867136 systemd[1]: Stopped target cryptsetup.target.
Feb  9 00:16:20.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.872962 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Feb  9 00:16:20.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.873120 systemd[1]: Stopped dracut-initqueue.service.
Feb  9 00:16:20.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.929597 ignition[1002]: INFO     : Ignition 2.14.0
Feb  9 00:16:20.929597 ignition[1002]: INFO     : Stage: umount
Feb  9 00:16:20.929597 ignition[1002]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 00:16:20.929597 ignition[1002]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Feb  9 00:16:20.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.877007 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Feb  9 00:16:20.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.962749 iscsid[809]: iscsid shutting down.
Feb  9 00:16:20.965820 ignition[1002]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Feb  9 00:16:20.965820 ignition[1002]: INFO     : umount: umount passed
Feb  9 00:16:20.965820 ignition[1002]: INFO     : Ignition finished successfully
Feb  9 00:16:20.891095 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Feb  9 00:16:20.894489 systemd[1]: ignition-files.service: Deactivated successfully.
Feb  9 00:16:20.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.894596 systemd[1]: Stopped ignition-files.service.
Feb  9 00:16:20.899416 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully.
Feb  9 00:16:21.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.899549 systemd[1]: Stopped flatcar-metadata-hostname.service.
Feb  9 00:16:20.907039 systemd[1]: Stopping ignition-mount.service...
Feb  9 00:16:21.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:20.912360 systemd[1]: Stopping iscsid.service...
Feb  9 00:16:20.916214 systemd[1]: Stopping sysroot-boot.service...
Feb  9 00:16:20.918644 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Feb  9 00:16:20.918831 systemd[1]: Stopped systemd-udev-trigger.service.
Feb  9 00:16:20.921734 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Feb  9 00:16:20.921881 systemd[1]: Stopped dracut-pre-trigger.service.
Feb  9 00:16:20.926407 systemd[1]: iscsid.service: Deactivated successfully.
Feb  9 00:16:20.932412 systemd[1]: Stopped iscsid.service.
Feb  9 00:16:20.936315 systemd[1]: ignition-mount.service: Deactivated successfully.
Feb  9 00:16:20.936398 systemd[1]: Stopped ignition-mount.service.
Feb  9 00:16:20.939994 systemd[1]: ignition-disks.service: Deactivated successfully.
Feb  9 00:16:20.940085 systemd[1]: Stopped ignition-disks.service.
Feb  9 00:16:20.945419 systemd[1]: ignition-kargs.service: Deactivated successfully.
Feb  9 00:16:20.945462 systemd[1]: Stopped ignition-kargs.service.
Feb  9 00:16:20.953246 systemd[1]: ignition-fetch.service: Deactivated successfully.
Feb  9 00:16:20.953294 systemd[1]: Stopped ignition-fetch.service.
Feb  9 00:16:20.955422 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Feb  9 00:16:20.955473 systemd[1]: Stopped ignition-fetch-offline.service.
Feb  9 00:16:20.957736 systemd[1]: Stopped target paths.target.
Feb  9 00:16:20.962687 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Feb  9 00:16:20.971025 systemd[1]: Stopped systemd-ask-password-console.path.
Feb  9 00:16:20.974841 systemd[1]: Stopped target slices.target.
Feb  9 00:16:20.979915 systemd[1]: Stopped target sockets.target.
Feb  9 00:16:20.983609 systemd[1]: iscsid.socket: Deactivated successfully.
Feb  9 00:16:20.983653 systemd[1]: Closed iscsid.socket.
Feb  9 00:16:20.988000 systemd[1]: ignition-setup.service: Deactivated successfully.
Feb  9 00:16:20.988059 systemd[1]: Stopped ignition-setup.service.
Feb  9 00:16:20.994925 systemd[1]: Stopping iscsiuio.service...
Feb  9 00:16:20.997853 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Feb  9 00:16:20.998381 systemd[1]: iscsiuio.service: Deactivated successfully.
Feb  9 00:16:20.998470 systemd[1]: Stopped iscsiuio.service.
Feb  9 00:16:21.001992 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Feb  9 00:16:21.002078 systemd[1]: Finished initrd-cleanup.service.
Feb  9 00:16:21.007471 systemd[1]: Stopped target network.target.
Feb  9 00:16:21.009702 systemd[1]: iscsiuio.socket: Deactivated successfully.
Feb  9 00:16:21.009731 systemd[1]: Closed iscsiuio.socket.
Feb  9 00:16:21.016038 systemd[1]: Stopping systemd-networkd.service...
Feb  9 00:16:21.086428 systemd[1]: Stopping systemd-resolved.service...
Feb  9 00:16:21.090597 systemd-networkd[801]: eth0: DHCPv6 lease lost
Feb  9 00:16:21.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.090891 systemd[1]: sysroot-boot.service: Deactivated successfully.
Feb  9 00:16:21.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.091008 systemd[1]: Stopped sysroot-boot.service.
Feb  9 00:16:21.093135 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Feb  9 00:16:21.093183 systemd[1]: Stopped initrd-setup-root.service.
Feb  9 00:16:21.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.097868 systemd[1]: systemd-resolved.service: Deactivated successfully.
Feb  9 00:16:21.112000 audit: BPF prog-id=6 op=UNLOAD
Feb  9 00:16:21.097958 systemd[1]: Stopped systemd-resolved.service.
Feb  9 00:16:21.105683 systemd[1]: systemd-networkd.service: Deactivated successfully.
Feb  9 00:16:21.105778 systemd[1]: Stopped systemd-networkd.service.
Feb  9 00:16:21.112463 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Feb  9 00:16:21.112499 systemd[1]: Closed systemd-networkd.socket.
Feb  9 00:16:21.117709 systemd[1]: Stopping network-cleanup.service...
Feb  9 00:16:21.121543 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Feb  9 00:16:21.121601 systemd[1]: Stopped parse-ip-for-networkd.service.
Feb  9 00:16:21.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.137876 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Feb  9 00:16:21.137938 systemd[1]: Stopped systemd-sysctl.service.
Feb  9 00:16:21.141000 audit: BPF prog-id=9 op=UNLOAD
Feb  9 00:16:21.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.144094 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Feb  9 00:16:21.144144 systemd[1]: Stopped systemd-modules-load.service.
Feb  9 00:16:21.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.151291 systemd[1]: Stopping systemd-udevd.service...
Feb  9 00:16:21.157837 systemd[1]: systemd-udevd.service: Deactivated successfully.
Feb  9 00:16:21.160126 systemd[1]: Stopped systemd-udevd.service.
Feb  9 00:16:21.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.164775 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Feb  9 00:16:21.164824 systemd[1]: Closed systemd-udevd-control.socket.
Feb  9 00:16:21.172555 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Feb  9 00:16:21.172600 systemd[1]: Closed systemd-udevd-kernel.socket.
Feb  9 00:16:21.179594 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Feb  9 00:16:21.179646 systemd[1]: Stopped dracut-pre-udev.service.
Feb  9 00:16:21.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.185643 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Feb  9 00:16:21.185692 systemd[1]: Stopped dracut-cmdline.service.
Feb  9 00:16:21.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.192200 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Feb  9 00:16:21.192250 systemd[1]: Stopped dracut-cmdline-ask.service.
Feb  9 00:16:21.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.199977 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Feb  9 00:16:21.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.202609 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Feb  9 00:16:21.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.202679 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service.
Feb  9 00:16:21.205487 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Feb  9 00:16:21.205544 systemd[1]: Stopped kmod-static-nodes.service.
Feb  9 00:16:21.232115 kernel: hv_netvsc 000d3ab0-ffbc-000d-3ab0-ffbc000d3ab0 eth0: Data path switched from VF: enP36024s1
Feb  9 00:16:21.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.207924 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Feb  9 00:16:21.207972 systemd[1]: Stopped systemd-vconsole-setup.service.
Feb  9 00:16:21.221150 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Feb  9 00:16:21.221233 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Feb  9 00:16:21.252784 systemd[1]: network-cleanup.service: Deactivated successfully.
Feb  9 00:16:21.255421 systemd[1]: Stopped network-cleanup.service.
Feb  9 00:16:21.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:21.259768 systemd[1]: Reached target initrd-switch-root.target.
Feb  9 00:16:21.265147 systemd[1]: Starting initrd-switch-root.service...
Feb  9 00:16:21.276448 systemd[1]: Switching root.
Feb  9 00:16:21.298337 systemd-journald[183]: Journal stopped
Feb  9 00:16:35.897093 systemd-journald[183]: Received SIGTERM from PID 1 (systemd).
Feb  9 00:16:35.897129 kernel: SELinux:  Class mctp_socket not defined in policy.
Feb  9 00:16:35.897140 kernel: SELinux:  Class anon_inode not defined in policy.
Feb  9 00:16:35.897151 kernel: SELinux: the above unknown classes and permissions will be allowed
Feb  9 00:16:35.897161 kernel: SELinux:  policy capability network_peer_controls=1
Feb  9 00:16:35.897171 kernel: SELinux:  policy capability open_perms=1
Feb  9 00:16:35.897183 kernel: SELinux:  policy capability extended_socket_class=1
Feb  9 00:16:35.897194 kernel: SELinux:  policy capability always_check_network=0
Feb  9 00:16:35.897205 kernel: SELinux:  policy capability cgroup_seclabel=1
Feb  9 00:16:35.897214 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Feb  9 00:16:35.897222 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Feb  9 00:16:35.897233 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Feb  9 00:16:35.897243 systemd[1]: Successfully loaded SELinux policy in 347.453ms.
Feb  9 00:16:35.897255 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 37.911ms.
Feb  9 00:16:35.897271 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Feb  9 00:16:35.897281 systemd[1]: Detected virtualization microsoft.
Feb  9 00:16:35.897294 systemd[1]: Detected architecture x86-64.
Feb  9 00:16:35.897302 systemd[1]: Detected first boot.
Feb  9 00:16:35.897317 systemd[1]: Hostname set to <ci-3510.3.2-a-f6a0525c7f>.
Feb  9 00:16:35.897327 systemd[1]: Initializing machine ID from random generator.
Feb  9 00:16:35.897338 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Feb  9 00:16:35.897347 kernel: kauditd_printk_skb: 42 callbacks suppressed
Feb  9 00:16:35.897360 kernel: audit: type=1400 audit(1707437785.936:90): avc:  denied  { associate } for  pid=1035 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Feb  9 00:16:35.897371 kernel: audit: type=1300 audit(1707437785.936:90): arch=c000003e syscall=188 success=yes exit=0 a0=c00018e7d2 a1=c00018aa80 a2=c00019ccc0 a3=32 items=0 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:16:35.897384 kernel: audit: type=1327 audit(1707437785.936:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 00:16:35.897396 kernel: audit: type=1400 audit(1707437785.944:91): avc:  denied  { associate } for  pid=1035 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Feb  9 00:16:35.897407 kernel: audit: type=1300 audit(1707437785.944:91): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018e8a9 a2=1ed a3=0 items=2 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:16:35.897418 kernel: audit: type=1307 audit(1707437785.944:91): cwd="/"
Feb  9 00:16:35.897428 kernel: audit: type=1302 audit(1707437785.944:91): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:35.897439 kernel: audit: type=1302 audit(1707437785.944:91): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:35.897452 kernel: audit: type=1327 audit(1707437785.944:91): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 00:16:35.897464 systemd[1]: Populated /etc with preset unit settings.
Feb  9 00:16:35.897473 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 00:16:35.897486 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 00:16:35.897499 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 00:16:35.897508 kernel: audit: type=1334 audit(1707437795.359:92): prog-id=12 op=LOAD
Feb  9 00:16:35.897518 kernel: audit: type=1334 audit(1707437795.359:93): prog-id=3 op=UNLOAD
Feb  9 00:16:35.897529 kernel: audit: type=1334 audit(1707437795.365:94): prog-id=13 op=LOAD
Feb  9 00:16:35.897542 kernel: audit: type=1334 audit(1707437795.375:95): prog-id=14 op=LOAD
Feb  9 00:16:35.897551 kernel: audit: type=1334 audit(1707437795.375:96): prog-id=4 op=UNLOAD
Feb  9 00:16:35.897565 kernel: audit: type=1334 audit(1707437795.375:97): prog-id=5 op=UNLOAD
Feb  9 00:16:35.897575 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Feb  9 00:16:35.897587 kernel: audit: type=1131 audit(1707437795.381:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.897597 systemd[1]: Stopped initrd-switch-root.service.
Feb  9 00:16:35.897610 kernel: audit: type=1130 audit(1707437795.415:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.897624 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Feb  9 00:16:35.897635 kernel: audit: type=1131 audit(1707437795.415:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.897645 systemd[1]: Created slice system-addon\x2dconfig.slice.
Feb  9 00:16:35.897657 kernel: audit: type=1334 audit(1707437795.455:101): prog-id=12 op=UNLOAD
Feb  9 00:16:35.897669 systemd[1]: Created slice system-addon\x2drun.slice.
Feb  9 00:16:35.897679 systemd[1]: Created slice system-getty.slice.
Feb  9 00:16:35.897692 systemd[1]: Created slice system-modprobe.slice.
Feb  9 00:16:35.897702 systemd[1]: Created slice system-serial\x2dgetty.slice.
Feb  9 00:16:35.897716 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Feb  9 00:16:35.897727 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Feb  9 00:16:35.897738 systemd[1]: Created slice user.slice.
Feb  9 00:16:35.897751 systemd[1]: Started systemd-ask-password-console.path.
Feb  9 00:16:35.897761 systemd[1]: Started systemd-ask-password-wall.path.
Feb  9 00:16:35.897772 systemd[1]: Set up automount boot.automount.
Feb  9 00:16:35.897782 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Feb  9 00:16:35.897796 systemd[1]: Stopped target initrd-switch-root.target.
Feb  9 00:16:35.897806 systemd[1]: Stopped target initrd-fs.target.
Feb  9 00:16:35.897820 systemd[1]: Stopped target initrd-root-fs.target.
Feb  9 00:16:35.897832 systemd[1]: Reached target integritysetup.target.
Feb  9 00:16:35.897842 systemd[1]: Reached target remote-cryptsetup.target.
Feb  9 00:16:35.897853 systemd[1]: Reached target remote-fs.target.
Feb  9 00:16:35.897865 systemd[1]: Reached target slices.target.
Feb  9 00:16:35.897878 systemd[1]: Reached target swap.target.
Feb  9 00:16:35.897887 systemd[1]: Reached target torcx.target.
Feb  9 00:16:35.897901 systemd[1]: Reached target veritysetup.target.
Feb  9 00:16:35.897912 systemd[1]: Listening on systemd-coredump.socket.
Feb  9 00:16:35.897923 systemd[1]: Listening on systemd-initctl.socket.
Feb  9 00:16:35.897934 systemd[1]: Listening on systemd-networkd.socket.
Feb  9 00:16:35.897946 systemd[1]: Listening on systemd-udevd-control.socket.
Feb  9 00:16:35.897961 systemd[1]: Listening on systemd-udevd-kernel.socket.
Feb  9 00:16:35.897971 systemd[1]: Listening on systemd-userdbd.socket.
Feb  9 00:16:35.897990 systemd[1]: Mounting dev-hugepages.mount...
Feb  9 00:16:35.898004 systemd[1]: Mounting dev-mqueue.mount...
Feb  9 00:16:35.898013 systemd[1]: Mounting media.mount...
Feb  9 00:16:35.898026 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Feb  9 00:16:35.898038 systemd[1]: Mounting sys-kernel-debug.mount...
Feb  9 00:16:35.898050 systemd[1]: Mounting sys-kernel-tracing.mount...
Feb  9 00:16:35.898061 systemd[1]: Mounting tmp.mount...
Feb  9 00:16:35.898075 systemd[1]: Starting flatcar-tmpfiles.service...
Feb  9 00:16:35.898087 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Feb  9 00:16:35.898097 systemd[1]: Starting kmod-static-nodes.service...
Feb  9 00:16:35.898110 systemd[1]: Starting modprobe@configfs.service...
Feb  9 00:16:35.898122 systemd[1]: Starting modprobe@dm_mod.service...
Feb  9 00:16:35.898132 systemd[1]: Starting modprobe@drm.service...
Feb  9 00:16:35.898143 systemd[1]: Starting modprobe@efi_pstore.service...
Feb  9 00:16:35.898154 systemd[1]: Starting modprobe@fuse.service...
Feb  9 00:16:35.898167 systemd[1]: Starting modprobe@loop.service...
Feb  9 00:16:35.898179 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Feb  9 00:16:35.898192 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Feb  9 00:16:35.898205 systemd[1]: Stopped systemd-fsck-root.service.
Feb  9 00:16:35.898215 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Feb  9 00:16:35.898227 systemd[1]: Stopped systemd-fsck-usr.service.
Feb  9 00:16:35.898238 systemd[1]: Stopped systemd-journald.service.
Feb  9 00:16:35.898251 systemd[1]: Starting systemd-journald.service...
Feb  9 00:16:35.898260 systemd[1]: Starting systemd-modules-load.service...
Feb  9 00:16:35.898273 systemd[1]: Starting systemd-network-generator.service...
Feb  9 00:16:35.898287 systemd[1]: Starting systemd-remount-fs.service...
Feb  9 00:16:35.898299 kernel: loop: module loaded
Feb  9 00:16:35.898310 systemd[1]: Starting systemd-udev-trigger.service...
Feb  9 00:16:35.898321 systemd[1]: verity-setup.service: Deactivated successfully.
Feb  9 00:16:35.898334 systemd[1]: Stopped verity-setup.service.
Feb  9 00:16:35.898344 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Feb  9 00:16:35.898357 systemd[1]: Mounted dev-hugepages.mount.
Feb  9 00:16:35.898368 systemd[1]: Mounted dev-mqueue.mount.
Feb  9 00:16:35.898381 systemd[1]: Mounted media.mount.
Feb  9 00:16:35.898391 kernel: fuse: init (API version 7.34)
Feb  9 00:16:35.898400 systemd[1]: Mounted sys-kernel-debug.mount.
Feb  9 00:16:35.898409 systemd[1]: Mounted sys-kernel-tracing.mount.
Feb  9 00:16:35.898421 systemd[1]: Mounted tmp.mount.
Feb  9 00:16:35.898435 systemd-journald[1124]: Journal started
Feb  9 00:16:35.898477 systemd-journald[1124]: Runtime Journal (/run/log/journal/1ef10bd2818e45fbb48aaa3c2a889781) is 8.0M, max 159.0M, 151.0M free.
Feb  9 00:16:23.756000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Feb  9 00:16:24.441000 audit[1]: AVC avc:  denied  { integrity } for  pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Feb  9 00:16:24.460000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Feb  9 00:16:24.460000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Feb  9 00:16:24.460000 audit: BPF prog-id=10 op=LOAD
Feb  9 00:16:24.460000 audit: BPF prog-id=10 op=UNLOAD
Feb  9 00:16:24.460000 audit: BPF prog-id=11 op=LOAD
Feb  9 00:16:24.460000 audit: BPF prog-id=11 op=UNLOAD
Feb  9 00:16:25.936000 audit[1035]: AVC avc:  denied  { associate } for  pid=1035 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Feb  9 00:16:25.936000 audit[1035]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018e7d2 a1=c00018aa80 a2=c00019ccc0 a3=32 items=0 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:16:25.936000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 00:16:25.944000 audit[1035]: AVC avc:  denied  { associate } for  pid=1035 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Feb  9 00:16:25.944000 audit[1035]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018e8a9 a2=1ed a3=0 items=2 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:16:25.944000 audit: CWD cwd="/"
Feb  9 00:16:25.944000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:25.944000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:25.944000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 00:16:35.359000 audit: BPF prog-id=12 op=LOAD
Feb  9 00:16:35.359000 audit: BPF prog-id=3 op=UNLOAD
Feb  9 00:16:35.365000 audit: BPF prog-id=13 op=LOAD
Feb  9 00:16:35.375000 audit: BPF prog-id=14 op=LOAD
Feb  9 00:16:35.375000 audit: BPF prog-id=4 op=UNLOAD
Feb  9 00:16:35.375000 audit: BPF prog-id=5 op=UNLOAD
Feb  9 00:16:35.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.455000 audit: BPF prog-id=12 op=UNLOAD
Feb  9 00:16:35.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.785000 audit: BPF prog-id=15 op=LOAD
Feb  9 00:16:35.788000 audit: BPF prog-id=16 op=LOAD
Feb  9 00:16:35.788000 audit: BPF prog-id=17 op=LOAD
Feb  9 00:16:35.788000 audit: BPF prog-id=13 op=UNLOAD
Feb  9 00:16:35.788000 audit: BPF prog-id=14 op=UNLOAD
Feb  9 00:16:35.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.894000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Feb  9 00:16:35.894000 audit[1124]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd1ac69a10 a2=4000 a3=7ffd1ac69aac items=0 ppid=1 pid=1124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:16:35.894000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Feb  9 00:16:25.882492 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 00:16:35.358543 systemd[1]: Queued start job for default target multi-user.target.
Feb  9 00:16:25.899969 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Feb  9 00:16:35.381977 systemd[1]: systemd-journald.service: Deactivated successfully.
Feb  9 00:16:25.900017 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Feb  9 00:16:25.900064 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Feb  9 00:16:25.900080 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="skipped missing lower profile" missing profile=oem
Feb  9 00:16:25.900128 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Feb  9 00:16:25.900149 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Feb  9 00:16:25.900384 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Feb  9 00:16:25.900427 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Feb  9 00:16:25.900442 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Feb  9 00:16:25.919535 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Feb  9 00:16:35.904916 systemd[1]: Started systemd-journald.service.
Feb  9 00:16:25.919574 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Feb  9 00:16:25.919619 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2
Feb  9 00:16:25.919637 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Feb  9 00:16:25.919656 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2
Feb  9 00:16:25.919675 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Feb  9 00:16:34.138856 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 00:16:34.139139 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 00:16:34.139284 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 00:16:34.139452 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 00:16:34.139498 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Feb  9 00:16:34.139553 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-02-09T00:16:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Feb  9 00:16:35.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.909064 systemd[1]: Finished flatcar-tmpfiles.service.
Feb  9 00:16:35.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.911642 systemd[1]: Finished kmod-static-nodes.service.
Feb  9 00:16:35.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.914305 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Feb  9 00:16:35.914453 systemd[1]: Finished modprobe@configfs.service.
Feb  9 00:16:35.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.917144 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Feb  9 00:16:35.917283 systemd[1]: Finished modprobe@dm_mod.service.
Feb  9 00:16:35.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.919669 systemd[1]: modprobe@drm.service: Deactivated successfully.
Feb  9 00:16:35.919808 systemd[1]: Finished modprobe@drm.service.
Feb  9 00:16:35.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.922161 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Feb  9 00:16:35.922297 systemd[1]: Finished modprobe@efi_pstore.service.
Feb  9 00:16:35.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.924692 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Feb  9 00:16:35.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.924850 systemd[1]: Finished modprobe@fuse.service.
Feb  9 00:16:35.927130 systemd[1]: modprobe@loop.service: Deactivated successfully.
Feb  9 00:16:35.927275 systemd[1]: Finished modprobe@loop.service.
Feb  9 00:16:35.929586 systemd[1]: Finished systemd-network-generator.service.
Feb  9 00:16:35.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.932225 systemd[1]: Finished systemd-remount-fs.service.
Feb  9 00:16:35.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.934777 systemd[1]: Reached target network-pre.target.
Feb  9 00:16:35.938254 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Feb  9 00:16:35.941804 systemd[1]: Mounting sys-kernel-config.mount...
Feb  9 00:16:35.945053 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Feb  9 00:16:35.948168 systemd[1]: Starting systemd-hwdb-update.service...
Feb  9 00:16:35.953098 systemd[1]: Starting systemd-journal-flush.service...
Feb  9 00:16:35.955633 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Feb  9 00:16:35.957118 systemd[1]: Starting systemd-random-seed.service...
Feb  9 00:16:35.959755 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Feb  9 00:16:35.961262 systemd[1]: Starting systemd-sysusers.service...
Feb  9 00:16:35.967694 systemd[1]: Finished systemd-modules-load.service.
Feb  9 00:16:35.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.970633 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Feb  9 00:16:35.973633 systemd[1]: Mounted sys-kernel-config.mount.
Feb  9 00:16:35.983028 systemd[1]: Starting systemd-sysctl.service...
Feb  9 00:16:35.989173 systemd[1]: Finished systemd-random-seed.service.
Feb  9 00:16:35.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:35.992055 systemd[1]: Reached target first-boot-complete.target.
Feb  9 00:16:36.011363 systemd-journald[1124]: Time spent on flushing to /var/log/journal/1ef10bd2818e45fbb48aaa3c2a889781 is 19.482ms for 1182 entries.
Feb  9 00:16:36.011363 systemd-journald[1124]: System Journal (/var/log/journal/1ef10bd2818e45fbb48aaa3c2a889781) is 8.0M, max 2.6G, 2.6G free.
Feb  9 00:16:36.124768 systemd-journald[1124]: Received client request to flush runtime journal.
Feb  9 00:16:36.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:36.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:36.011194 systemd[1]: Finished systemd-udev-trigger.service.
Feb  9 00:16:36.018548 systemd[1]: Starting systemd-udev-settle.service...
Feb  9 00:16:36.125313 udevadm[1158]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in.
Feb  9 00:16:36.058518 systemd[1]: Finished systemd-sysctl.service.
Feb  9 00:16:36.125908 systemd[1]: Finished systemd-journal-flush.service.
Feb  9 00:16:36.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:36.562105 systemd[1]: Finished systemd-sysusers.service.
Feb  9 00:16:36.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:36.566087 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Feb  9 00:16:37.613268 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Feb  9 00:16:37.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:38.043015 systemd[1]: Finished systemd-hwdb-update.service.
Feb  9 00:16:38.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:38.045000 audit: BPF prog-id=18 op=LOAD
Feb  9 00:16:38.045000 audit: BPF prog-id=19 op=LOAD
Feb  9 00:16:38.045000 audit: BPF prog-id=7 op=UNLOAD
Feb  9 00:16:38.045000 audit: BPF prog-id=8 op=UNLOAD
Feb  9 00:16:38.047256 systemd[1]: Starting systemd-udevd.service...
Feb  9 00:16:38.064028 systemd-udevd[1163]: Using default interface naming scheme 'v252'.
Feb  9 00:16:38.466576 systemd[1]: Started systemd-udevd.service.
Feb  9 00:16:38.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:38.469000 audit: BPF prog-id=20 op=LOAD
Feb  9 00:16:38.471442 systemd[1]: Starting systemd-networkd.service...
Feb  9 00:16:38.510213 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Feb  9 00:16:38.582019 kernel: mousedev: PS/2 mouse device common for all mice
Feb  9 00:16:38.602000 audit[1166]: AVC avc:  denied  { confidentiality } for  pid=1166 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Feb  9 00:16:38.608997 kernel: hv_vmbus: registering driver hv_balloon
Feb  9 00:16:38.617792 kernel: hv_utils: Registering HyperV Utility Driver
Feb  9 00:16:38.617871 kernel: hv_vmbus: registering driver hv_utils
Feb  9 00:16:38.537031 kernel: hv_vmbus: registering driver hyperv_fb
Feb  9 00:16:38.589182 kernel: hv_utils: Heartbeat IC version 3.0
Feb  9 00:16:38.589218 kernel: hv_utils: Shutdown IC version 3.2
Feb  9 00:16:38.589239 kernel: hv_utils: TimeSync IC version 4.0
Feb  9 00:16:38.589258 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0
Feb  9 00:16:38.589278 systemd-journald[1124]: Time jumped backwards, rotating.
Feb  9 00:16:38.589371 kernel: hyperv_fb: Synthvid Version major 3, minor 5
Feb  9 00:16:38.589396 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608
Feb  9 00:16:38.589417 kernel: Console: switching to colour dummy device 80x25
Feb  9 00:16:38.589436 kernel: Console: switching to colour frame buffer device 128x48
Feb  9 00:16:38.602000 audit[1166]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5643c681e700 a1=f884 a2=7f46a8fafbc5 a3=5 items=12 ppid=1163 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:16:38.602000 audit: CWD cwd="/"
Feb  9 00:16:38.602000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=1 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=2 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=3 name=(null) inode=14894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=4 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=5 name=(null) inode=14895 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=6 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=7 name=(null) inode=14896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=8 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=9 name=(null) inode=14897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=10 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PATH item=11 name=(null) inode=14898 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:16:38.602000 audit: PROCTITLE proctitle="(udev-worker)"
Feb  9 00:16:38.583000 audit: BPF prog-id=21 op=LOAD
Feb  9 00:16:38.583000 audit: BPF prog-id=22 op=LOAD
Feb  9 00:16:38.583000 audit: BPF prog-id=23 op=LOAD
Feb  9 00:16:38.585792 systemd[1]: Starting systemd-userdbd.service...
Feb  9 00:16:38.641309 systemd[1]: Started systemd-userdbd.service.
Feb  9 00:16:38.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:38.768509 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1192)
Feb  9 00:16:38.804114 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Feb  9 00:16:38.882678 kernel: KVM: vmx: using Hyper-V Enlightened VMCS
Feb  9 00:16:38.914870 systemd[1]: Finished systemd-udev-settle.service.
Feb  9 00:16:38.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:38.918878 systemd[1]: Starting lvm2-activation-early.service...
Feb  9 00:16:39.137707 systemd-networkd[1169]: lo: Link UP
Feb  9 00:16:39.137716 systemd-networkd[1169]: lo: Gained carrier
Feb  9 00:16:39.138280 systemd-networkd[1169]: Enumeration completed
Feb  9 00:16:39.138456 systemd[1]: Started systemd-networkd.service.
Feb  9 00:16:39.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:39.142433 systemd[1]: Starting systemd-networkd-wait-online.service...
Feb  9 00:16:39.174106 systemd-networkd[1169]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 00:16:39.228507 kernel: mlx5_core 8cb8:00:02.0 enP36024s1: Link up
Feb  9 00:16:39.264532 kernel: hv_netvsc 000d3ab0-ffbc-000d-3ab0-ffbc000d3ab0 eth0: Data path switched to VF: enP36024s1
Feb  9 00:16:39.265623 systemd-networkd[1169]: enP36024s1: Link UP
Feb  9 00:16:39.265947 systemd-networkd[1169]: eth0: Link UP
Feb  9 00:16:39.266020 systemd-networkd[1169]: eth0: Gained carrier
Feb  9 00:16:39.270760 systemd-networkd[1169]: enP36024s1: Gained carrier
Feb  9 00:16:39.289001 lvm[1239]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Feb  9 00:16:39.304610 systemd-networkd[1169]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16
Feb  9 00:16:39.312159 systemd[1]: Finished lvm2-activation-early.service.
Feb  9 00:16:39.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:39.315047 systemd[1]: Reached target cryptsetup.target.
Feb  9 00:16:39.318999 systemd[1]: Starting lvm2-activation.service...
Feb  9 00:16:39.325290 lvm[1242]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Feb  9 00:16:39.352512 systemd[1]: Finished lvm2-activation.service.
Feb  9 00:16:39.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:39.355765 systemd[1]: Reached target local-fs-pre.target.
Feb  9 00:16:39.358371 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Feb  9 00:16:39.358411 systemd[1]: Reached target local-fs.target.
Feb  9 00:16:39.360658 systemd[1]: Reached target machines.target.
Feb  9 00:16:39.363906 systemd[1]: Starting ldconfig.service...
Feb  9 00:16:39.366256 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Feb  9 00:16:39.366346 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 00:16:39.367526 systemd[1]: Starting systemd-boot-update.service...
Feb  9 00:16:39.370808 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Feb  9 00:16:39.374696 systemd[1]: Starting systemd-machine-id-commit.service...
Feb  9 00:16:39.377088 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Feb  9 00:16:39.377184 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Feb  9 00:16:39.378344 systemd[1]: Starting systemd-tmpfiles-setup.service...
Feb  9 00:16:39.436330 systemd-tmpfiles[1247]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Feb  9 00:16:39.451477 systemd-tmpfiles[1247]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Feb  9 00:16:39.534953 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1244 (bootctl)
Feb  9 00:16:39.536463 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Feb  9 00:16:40.017188 systemd-tmpfiles[1247]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Feb  9 00:16:40.055279 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Feb  9 00:16:40.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:40.190305 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Feb  9 00:16:40.190946 systemd[1]: Finished systemd-machine-id-commit.service.
Feb  9 00:16:40.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.106691 systemd-networkd[1169]: eth0: Gained IPv6LL
Feb  9 00:16:41.113301 systemd[1]: Finished systemd-networkd-wait-online.service.
Feb  9 00:16:41.129636 kernel: kauditd_printk_skb: 70 callbacks suppressed
Feb  9 00:16:41.129671 kernel: audit: type=1130 audit(1707437801.111:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.148765 systemd-fsck[1252]: fsck.fat 4.2 (2021-01-31)
Feb  9 00:16:41.148765 systemd-fsck[1252]: /dev/sda1: 789 files, 115332/258078 clusters
Feb  9 00:16:41.150199 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Feb  9 00:16:41.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.154825 systemd[1]: Mounting boot.mount...
Feb  9 00:16:41.167602 kernel: audit: type=1130 audit(1707437801.151:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.170906 systemd[1]: Mounted boot.mount.
Feb  9 00:16:41.186702 systemd[1]: Finished systemd-boot-update.service.
Feb  9 00:16:41.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.200499 kernel: audit: type=1130 audit(1707437801.187:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.950098 systemd[1]: Finished systemd-tmpfiles-setup.service.
Feb  9 00:16:41.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.954180 systemd[1]: Starting audit-rules.service...
Feb  9 00:16:41.966614 kernel: audit: type=1130 audit(1707437801.951:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:41.968056 systemd[1]: Starting clean-ca-certificates.service...
Feb  9 00:16:41.971625 systemd[1]: Starting systemd-journal-catalog-update.service...
Feb  9 00:16:41.973000 audit: BPF prog-id=24 op=LOAD
Feb  9 00:16:41.976060 systemd[1]: Starting systemd-resolved.service...
Feb  9 00:16:41.979499 kernel: audit: type=1334 audit(1707437801.973:159): prog-id=24 op=LOAD
Feb  9 00:16:41.980000 audit: BPF prog-id=25 op=LOAD
Feb  9 00:16:41.983034 systemd[1]: Starting systemd-timesyncd.service...
Feb  9 00:16:41.986965 kernel: audit: type=1334 audit(1707437801.980:160): prog-id=25 op=LOAD
Feb  9 00:16:41.988909 systemd[1]: Starting systemd-update-utmp.service...
Feb  9 00:16:42.017000 audit[1264]: SYSTEM_BOOT pid=1264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.034512 kernel: audit: type=1127 audit(1707437802.017:161): pid=1264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.023114 systemd[1]: Finished systemd-update-utmp.service.
Feb  9 00:16:42.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.051501 kernel: audit: type=1130 audit(1707437802.035:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.058303 systemd[1]: Finished clean-ca-certificates.service.
Feb  9 00:16:42.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.061053 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Feb  9 00:16:42.074609 kernel: audit: type=1130 audit(1707437802.059:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.103085 systemd[1]: Started systemd-timesyncd.service.
Feb  9 00:16:42.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.105972 systemd[1]: Reached target time-set.target.
Feb  9 00:16:42.119517 kernel: audit: type=1130 audit(1707437802.104:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.184396 systemd[1]: Finished systemd-journal-catalog-update.service.
Feb  9 00:16:42.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:16:42.192128 systemd-resolved[1262]: Positive Trust Anchors:
Feb  9 00:16:42.192143 systemd-resolved[1262]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Feb  9 00:16:42.192189 systemd-resolved[1262]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Feb  9 00:16:42.301454 augenrules[1279]: No rules
Feb  9 00:16:42.299000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Feb  9 00:16:42.299000 audit[1279]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffdfa53270 a2=420 a3=0 items=0 ppid=1258 pid=1279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:16:42.299000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Feb  9 00:16:42.301799 systemd[1]: Finished audit-rules.service.
Feb  9 00:16:42.321118 systemd-resolved[1262]: Using system hostname 'ci-3510.3.2-a-f6a0525c7f'.
Feb  9 00:16:42.322655 systemd[1]: Started systemd-resolved.service.
Feb  9 00:16:42.325070 systemd[1]: Reached target network.target.
Feb  9 00:16:42.327344 systemd[1]: Reached target network-online.target.
Feb  9 00:16:42.329730 systemd[1]: Reached target nss-lookup.target.
Feb  9 00:16:47.912153 ldconfig[1243]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Feb  9 00:16:47.922222 systemd[1]: Finished ldconfig.service.
Feb  9 00:16:47.926018 systemd[1]: Starting systemd-update-done.service...
Feb  9 00:16:47.952002 systemd[1]: Finished systemd-update-done.service.
Feb  9 00:16:47.954564 systemd[1]: Reached target sysinit.target.
Feb  9 00:16:47.956797 systemd[1]: Started motdgen.path.
Feb  9 00:16:47.958633 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Feb  9 00:16:47.961614 systemd[1]: Started logrotate.timer.
Feb  9 00:16:47.963470 systemd[1]: Started mdadm.timer.
Feb  9 00:16:47.965413 systemd[1]: Started systemd-tmpfiles-clean.timer.
Feb  9 00:16:47.967775 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Feb  9 00:16:47.967809 systemd[1]: Reached target paths.target.
Feb  9 00:16:47.969714 systemd[1]: Reached target timers.target.
Feb  9 00:16:47.972069 systemd[1]: Listening on dbus.socket.
Feb  9 00:16:47.974929 systemd[1]: Starting docker.socket...
Feb  9 00:16:48.015470 systemd[1]: Listening on sshd.socket.
Feb  9 00:16:48.017963 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 00:16:48.018555 systemd[1]: Listening on docker.socket.
Feb  9 00:16:48.020927 systemd[1]: Reached target sockets.target.
Feb  9 00:16:48.023413 systemd[1]: Reached target basic.target.
Feb  9 00:16:48.025649 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Feb  9 00:16:48.025683 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Feb  9 00:16:48.026696 systemd[1]: Starting containerd.service...
Feb  9 00:16:48.029904 systemd[1]: Starting dbus.service...
Feb  9 00:16:48.033000 systemd[1]: Starting enable-oem-cloudinit.service...
Feb  9 00:16:48.036620 systemd[1]: Starting extend-filesystems.service...
Feb  9 00:16:48.038889 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Feb  9 00:16:48.040298 systemd[1]: Starting motdgen.service...
Feb  9 00:16:48.044117 systemd[1]: Started nvidia.service.
Feb  9 00:16:48.047659 systemd[1]: Starting prepare-cni-plugins.service...
Feb  9 00:16:48.051100 systemd[1]: Starting prepare-critools.service...
Feb  9 00:16:48.054459 systemd[1]: Starting ssh-key-proc-cmdline.service...
Feb  9 00:16:48.057973 systemd[1]: Starting sshd-keygen.service...
Feb  9 00:16:48.063117 systemd[1]: Starting systemd-logind.service...
Feb  9 00:16:48.066410 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 00:16:48.066479 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Feb  9 00:16:48.067010 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Feb  9 00:16:48.067900 systemd[1]: Starting update-engine.service...
Feb  9 00:16:48.071709 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Feb  9 00:16:48.083044 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Feb  9 00:16:48.083273 systemd[1]: Finished ssh-key-proc-cmdline.service.
Feb  9 00:16:48.110234 systemd[1]: motdgen.service: Deactivated successfully.
Feb  9 00:16:48.110444 systemd[1]: Finished motdgen.service.
Feb  9 00:16:48.123455 jq[1305]: true
Feb  9 00:16:48.124509 jq[1289]: false
Feb  9 00:16:48.125314 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Feb  9 00:16:48.125541 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Feb  9 00:16:48.129156 extend-filesystems[1290]: Found sda
Feb  9 00:16:48.131599 extend-filesystems[1290]: Found sda1
Feb  9 00:16:48.131599 extend-filesystems[1290]: Found sda2
Feb  9 00:16:48.131599 extend-filesystems[1290]: Found sda3
Feb  9 00:16:48.131599 extend-filesystems[1290]: Found usr
Feb  9 00:16:48.131599 extend-filesystems[1290]: Found sda4
Feb  9 00:16:48.131599 extend-filesystems[1290]: Found sda6
Feb  9 00:16:48.131599 extend-filesystems[1290]: Found sda7
Feb  9 00:16:48.131599 extend-filesystems[1290]: Found sda9
Feb  9 00:16:48.131599 extend-filesystems[1290]: Checking size of /dev/sda9
Feb  9 00:16:48.153307 jq[1316]: true
Feb  9 00:16:48.176132 env[1312]: time="2024-02-09T00:16:48.176037800Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Feb  9 00:16:48.198711 env[1312]: time="2024-02-09T00:16:48.198572900Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Feb  9 00:16:48.198839 env[1312]: time="2024-02-09T00:16:48.198732000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200013 env[1312]: time="2024-02-09T00:16:48.199974600Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200013 env[1312]: time="2024-02-09T00:16:48.200004800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200250 env[1312]: time="2024-02-09T00:16:48.200222400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200250 env[1312]: time="2024-02-09T00:16:48.200245500Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200341 env[1312]: time="2024-02-09T00:16:48.200262200Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Feb  9 00:16:48.200341 env[1312]: time="2024-02-09T00:16:48.200275200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200418 env[1312]: time="2024-02-09T00:16:48.200371400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200637 env[1312]: time="2024-02-09T00:16:48.200612100Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200811 env[1312]: time="2024-02-09T00:16:48.200784800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Feb  9 00:16:48.200811 env[1312]: time="2024-02-09T00:16:48.200806500Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Feb  9 00:16:48.200900 env[1312]: time="2024-02-09T00:16:48.200870500Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Feb  9 00:16:48.200900 env[1312]: time="2024-02-09T00:16:48.200886300Z" level=info msg="metadata content store policy set" policy=shared
Feb  9 00:16:48.208403 systemd-logind[1301]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Feb  9 00:16:48.212597 systemd-logind[1301]: New seat seat0.
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.224924100Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.224968000Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.224983700Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225015700Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225033500Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225046000Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225059000Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225071400Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225086400Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225104600Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225121200Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225137000Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225229800Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Feb  9 00:16:48.225506 env[1312]: time="2024-02-09T00:16:48.225292300Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.225928700Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.225965100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.225978700Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226024200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226039300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226050500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226061800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226072800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226086700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226101800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226117300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226134100Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226240900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226254400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226632 env[1312]: time="2024-02-09T00:16:48.226264700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.226961 env[1312]: time="2024-02-09T00:16:48.226274500Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Feb  9 00:16:48.226961 env[1312]: time="2024-02-09T00:16:48.226288100Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Feb  9 00:16:48.226961 env[1312]: time="2024-02-09T00:16:48.226297700Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Feb  9 00:16:48.226961 env[1312]: time="2024-02-09T00:16:48.226315500Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Feb  9 00:16:48.226961 env[1312]: time="2024-02-09T00:16:48.226356100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Feb  9 00:16:48.227191 env[1312]: time="2024-02-09T00:16:48.227136400Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.227297700Z" level=info msg="Connect containerd service"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.227333100Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.227884300Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228017700Z" level=info msg="Start subscribing containerd event"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228071700Z" level=info msg="Start recovering state"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228154100Z" level=info msg="Start event monitor"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228178900Z" level=info msg="Start snapshots syncer"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228191900Z" level=info msg="Start cni network conf syncer for default"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228201900Z" level=info msg="Start streaming server"
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228217000Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228277700Z" level=info msg=serving... address=/run/containerd/containerd.sock
Feb  9 00:16:48.282826 env[1312]: time="2024-02-09T00:16:48.228349800Z" level=info msg="containerd successfully booted in 0.054110s"
Feb  9 00:16:48.283244 extend-filesystems[1290]: Old size kept for /dev/sda9
Feb  9 00:16:48.283244 extend-filesystems[1290]: Found sr0
Feb  9 00:16:48.292371 tar[1309]: crictl
Feb  9 00:16:48.228423 systemd[1]: Started containerd.service.
Feb  9 00:16:48.292753 tar[1308]: ./
Feb  9 00:16:48.292753 tar[1308]: ./macvlan
Feb  9 00:16:48.252813 systemd[1]: extend-filesystems.service: Deactivated successfully.
Feb  9 00:16:48.253018 systemd[1]: Finished extend-filesystems.service.
Feb  9 00:16:48.316501 bash[1344]: Updated "/home/core/.ssh/authorized_keys"
Feb  9 00:16:48.317231 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Feb  9 00:16:48.343529 tar[1308]: ./static
Feb  9 00:16:48.439672 systemd[1]: nvidia.service: Deactivated successfully.
Feb  9 00:16:48.441558 tar[1308]: ./vlan
Feb  9 00:16:48.488214 dbus-daemon[1288]: [system] SELinux support is enabled
Feb  9 00:16:48.488369 systemd[1]: Started dbus.service.
Feb  9 00:16:48.492973 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Feb  9 00:16:48.493011 systemd[1]: Reached target system-config.target.
Feb  9 00:16:48.495479 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Feb  9 00:16:48.495514 systemd[1]: Reached target user-config.target.
Feb  9 00:16:48.499449 systemd[1]: Started systemd-logind.service.
Feb  9 00:16:48.502818 dbus-daemon[1288]: [system] Successfully activated service 'org.freedesktop.systemd1'
Feb  9 00:16:48.543026 tar[1308]: ./portmap
Feb  9 00:16:48.619577 tar[1308]: ./host-local
Feb  9 00:16:48.691944 tar[1308]: ./vrf
Feb  9 00:16:48.768855 tar[1308]: ./bridge
Feb  9 00:16:48.857876 tar[1308]: ./tuning
Feb  9 00:16:48.928254 tar[1308]: ./firewall
Feb  9 00:16:48.961948 systemd[1]: Finished prepare-critools.service.
Feb  9 00:16:48.993051 tar[1308]: ./host-device
Feb  9 00:16:49.021065 update_engine[1304]: I0209 00:16:49.000437  1304 main.cc:92] Flatcar Update Engine starting
Feb  9 00:16:49.034662 tar[1308]: ./sbr
Feb  9 00:16:49.071885 tar[1308]: ./loopback
Feb  9 00:16:49.086822 systemd[1]: Started update-engine.service.
Feb  9 00:16:49.095081 update_engine[1304]: I0209 00:16:49.086884  1304 update_check_scheduler.cc:74] Next update check in 6m4s
Feb  9 00:16:49.092233 systemd[1]: Started locksmithd.service.
Feb  9 00:16:49.109697 tar[1308]: ./dhcp
Feb  9 00:16:49.208220 tar[1308]: ./ptp
Feb  9 00:16:49.250696 tar[1308]: ./ipvlan
Feb  9 00:16:49.291695 tar[1308]: ./bandwidth
Feb  9 00:16:49.373927 systemd[1]: Finished prepare-cni-plugins.service.
Feb  9 00:16:49.653031 sshd_keygen[1310]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Feb  9 00:16:49.672664 systemd[1]: Finished sshd-keygen.service.
Feb  9 00:16:49.677056 systemd[1]: Starting issuegen.service...
Feb  9 00:16:49.680725 systemd[1]: Started waagent.service.
Feb  9 00:16:49.684723 systemd[1]: issuegen.service: Deactivated successfully.
Feb  9 00:16:49.684946 systemd[1]: Finished issuegen.service.
Feb  9 00:16:49.688694 systemd[1]: Starting systemd-user-sessions.service...
Feb  9 00:16:49.696377 systemd[1]: Finished systemd-user-sessions.service.
Feb  9 00:16:49.700176 systemd[1]: Started getty@tty1.service.
Feb  9 00:16:49.703571 systemd[1]: Started serial-getty@ttyS0.service.
Feb  9 00:16:49.706275 systemd[1]: Reached target getty.target.
Feb  9 00:16:49.708447 systemd[1]: Reached target multi-user.target.
Feb  9 00:16:49.711783 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Feb  9 00:16:49.721610 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Feb  9 00:16:49.721777 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Feb  9 00:16:49.725080 systemd[1]: Startup finished in 1.122s (firmware) + 34.909s (loader) + 940ms (kernel) + 31.406s (initrd) + 26.693s (userspace) = 1min 35.072s.
Feb  9 00:16:50.226219 login[1410]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Feb  9 00:16:50.226808 login[1409]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Feb  9 00:16:50.253916 systemd[1]: Created slice user-500.slice.
Feb  9 00:16:50.255384 systemd[1]: Starting user-runtime-dir@500.service...
Feb  9 00:16:50.258091 systemd-logind[1301]: New session 1 of user core.
Feb  9 00:16:50.261345 systemd-logind[1301]: New session 2 of user core.
Feb  9 00:16:50.294583 systemd[1]: Finished user-runtime-dir@500.service.
Feb  9 00:16:50.296258 systemd[1]: Starting user@500.service...
Feb  9 00:16:50.299461 (systemd)[1416]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Feb  9 00:16:50.462357 systemd[1416]: Queued start job for default target default.target.
Feb  9 00:16:50.463120 systemd[1416]: Reached target paths.target.
Feb  9 00:16:50.463157 systemd[1416]: Reached target sockets.target.
Feb  9 00:16:50.463178 systemd[1416]: Reached target timers.target.
Feb  9 00:16:50.463197 systemd[1416]: Reached target basic.target.
Feb  9 00:16:50.463334 systemd[1]: Started user@500.service.
Feb  9 00:16:50.464810 systemd[1]: Started session-1.scope.
Feb  9 00:16:50.465818 systemd[1]: Started session-2.scope.
Feb  9 00:16:50.466971 systemd[1416]: Reached target default.target.
Feb  9 00:16:50.467206 systemd[1416]: Startup finished in 161ms.
Feb  9 00:16:50.807044 locksmithd[1393]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Feb  9 00:16:52.628905 systemd-timesyncd[1263]: Timed out waiting for reply from 162.159.200.1:123 (0.flatcar.pool.ntp.org).
Feb  9 00:16:56.381633 waagent[1404]: 2024-02-09T00:16:56.381521Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2
Feb  9 00:16:56.394911 waagent[1404]: 2024-02-09T00:16:56.383025Z INFO Daemon Daemon OS: flatcar 3510.3.2
Feb  9 00:16:56.394911 waagent[1404]: 2024-02-09T00:16:56.384019Z INFO Daemon Daemon Python: 3.9.16
Feb  9 00:16:56.394911 waagent[1404]: 2024-02-09T00:16:56.385132Z INFO Daemon Daemon Run daemon
Feb  9 00:16:56.394911 waagent[1404]: 2024-02-09T00:16:56.386033Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2'
Feb  9 00:16:56.399515 waagent[1404]: 2024-02-09T00:16:56.399393Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1.
Feb  9 00:16:56.407152 waagent[1404]: 2024-02-09T00:16:56.407036Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service'
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.407474Z INFO Daemon Daemon cloud-init is enabled: False
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.408342Z INFO Daemon Daemon Using waagent for provisioning
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.409756Z INFO Daemon Daemon Activate resource disk
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.410544Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.418315Z INFO Daemon Daemon Found device: None
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.418982Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.419828Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.421478Z INFO Daemon Daemon Clean protocol and wireserver endpoint
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.422578Z INFO Daemon Daemon Running default provisioning handler
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.432283Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1.
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.435268Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service'
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.436381Z INFO Daemon Daemon cloud-init is enabled: False
Feb  9 00:16:56.450362 waagent[1404]: 2024-02-09T00:16:56.437159Z INFO Daemon Daemon Copying ovf-env.xml
Feb  9 00:16:56.457430 waagent[1404]: 2024-02-09T00:16:56.457306Z INFO Daemon Daemon Successfully mounted dvd
Feb  9 00:16:56.585136 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully.
Feb  9 00:16:56.590209 waagent[1404]: 2024-02-09T00:16:56.590090Z INFO Daemon Daemon Detect protocol endpoint
Feb  9 00:16:56.604926 waagent[1404]: 2024-02-09T00:16:56.590597Z INFO Daemon Daemon Clean protocol and wireserver endpoint
Feb  9 00:16:56.604926 waagent[1404]: 2024-02-09T00:16:56.591679Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler
Feb  9 00:16:56.604926 waagent[1404]: 2024-02-09T00:16:56.592438Z INFO Daemon Daemon Test for route to 168.63.129.16
Feb  9 00:16:56.604926 waagent[1404]: 2024-02-09T00:16:56.593430Z INFO Daemon Daemon Route to 168.63.129.16 exists
Feb  9 00:16:56.604926 waagent[1404]: 2024-02-09T00:16:56.594086Z INFO Daemon Daemon Wire server endpoint:168.63.129.16
Feb  9 00:16:56.705673 waagent[1404]: 2024-02-09T00:16:56.705532Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05
Feb  9 00:16:56.713865 waagent[1404]: 2024-02-09T00:16:56.706420Z INFO Daemon Daemon Wire protocol version:2012-11-30
Feb  9 00:16:56.713865 waagent[1404]: 2024-02-09T00:16:56.707201Z INFO Daemon Daemon Server preferred version:2015-04-05
Feb  9 00:16:57.159322 waagent[1404]: 2024-02-09T00:16:57.159174Z INFO Daemon Daemon Initializing goal state during protocol detection
Feb  9 00:16:57.168432 waagent[1404]: 2024-02-09T00:16:57.168355Z INFO Daemon Daemon Forcing an update of the goal state..
Feb  9 00:16:57.173698 waagent[1404]: 2024-02-09T00:16:57.168710Z INFO Daemon Daemon Fetching goal state [incarnation 1]
Feb  9 00:16:57.263049 waagent[1404]: 2024-02-09T00:16:57.262907Z INFO Daemon Daemon Found private key matching thumbprint 6B33792653012471E3B41270C09EB62D698A30D7
Feb  9 00:16:57.267678 waagent[1404]: 2024-02-09T00:16:57.267600Z INFO Daemon Daemon Certificate with thumbprint 0EB7847603E6362A012546B2C2D16731AD8AAD3E has no matching private key.
Feb  9 00:16:57.272699 waagent[1404]: 2024-02-09T00:16:57.272628Z INFO Daemon Daemon Fetch goal state completed
Feb  9 00:16:57.313895 waagent[1404]: 2024-02-09T00:16:57.313814Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 85712ddb-8629-4c03-a604-a7a18af932ee New eTag: 12573242032570228849]
Feb  9 00:16:57.320323 waagent[1404]: 2024-02-09T00:16:57.320237Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob
Feb  9 00:16:57.333472 waagent[1404]: 2024-02-09T00:16:57.333407Z INFO Daemon Daemon Starting provisioning
Feb  9 00:16:57.336111 waagent[1404]: 2024-02-09T00:16:57.336046Z INFO Daemon Daemon Handle ovf-env.xml.
Feb  9 00:16:57.338776 waagent[1404]: 2024-02-09T00:16:57.338713Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-f6a0525c7f]
Feb  9 00:16:57.364098 waagent[1404]: 2024-02-09T00:16:57.363969Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-f6a0525c7f]
Feb  9 00:16:57.368078 waagent[1404]: 2024-02-09T00:16:57.368006Z INFO Daemon Daemon Examine /proc/net/route for primary interface
Feb  9 00:16:57.372408 waagent[1404]: 2024-02-09T00:16:57.372345Z INFO Daemon Daemon Primary interface is [eth0]
Feb  9 00:16:57.386692 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully.
Feb  9 00:16:57.386945 systemd[1]: Stopped systemd-networkd-wait-online.service.
Feb  9 00:16:57.387018 systemd[1]: Stopping systemd-networkd-wait-online.service...
Feb  9 00:16:57.387357 systemd[1]: Stopping systemd-networkd.service...
Feb  9 00:16:57.392533 systemd-networkd[1169]: eth0: DHCPv6 lease lost
Feb  9 00:16:57.394039 systemd[1]: systemd-networkd.service: Deactivated successfully.
Feb  9 00:16:57.394222 systemd[1]: Stopped systemd-networkd.service.
Feb  9 00:16:57.396683 systemd[1]: Starting systemd-networkd.service...
Feb  9 00:16:57.426572 systemd-networkd[1457]: enP36024s1: Link UP
Feb  9 00:16:57.426582 systemd-networkd[1457]: enP36024s1: Gained carrier
Feb  9 00:16:57.427880 systemd-networkd[1457]: eth0: Link UP
Feb  9 00:16:57.427889 systemd-networkd[1457]: eth0: Gained carrier
Feb  9 00:16:57.428318 systemd-networkd[1457]: lo: Link UP
Feb  9 00:16:57.428326 systemd-networkd[1457]: lo: Gained carrier
Feb  9 00:16:57.428658 systemd-networkd[1457]: eth0: Gained IPv6LL
Feb  9 00:16:57.429247 systemd-networkd[1457]: Enumeration completed
Feb  9 00:16:57.429350 systemd[1]: Started systemd-networkd.service.
Feb  9 00:16:57.431663 systemd[1]: Starting systemd-networkd-wait-online.service...
Feb  9 00:16:57.435542 waagent[1404]: 2024-02-09T00:16:57.433954Z INFO Daemon Daemon Create user account if not exists
Feb  9 00:16:57.437828 waagent[1404]: 2024-02-09T00:16:57.437745Z INFO Daemon Daemon User core already exists, skip useradd
Feb  9 00:16:57.439012 systemd-networkd[1457]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 00:16:57.440976 waagent[1404]: 2024-02-09T00:16:57.440905Z INFO Daemon Daemon Configure sudoer
Feb  9 00:16:57.444082 waagent[1404]: 2024-02-09T00:16:57.444019Z INFO Daemon Daemon Configure sshd
Feb  9 00:16:57.446425 waagent[1404]: 2024-02-09T00:16:57.446362Z INFO Daemon Daemon Deploy ssh public key.
Feb  9 00:16:57.516588 systemd-networkd[1457]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16
Feb  9 00:16:57.520799 systemd[1]: Finished systemd-networkd-wait-online.service.
Feb  9 00:16:57.538384 waagent[1404]: 2024-02-09T00:16:57.538260Z INFO Daemon Daemon Decode custom data
Feb  9 00:16:57.541236 waagent[1404]: 2024-02-09T00:16:57.541163Z INFO Daemon Daemon Save custom data
Feb  9 00:16:58.793969 waagent[1404]: 2024-02-09T00:16:58.793873Z INFO Daemon Daemon Provisioning complete
Feb  9 00:16:58.809040 waagent[1404]: 2024-02-09T00:16:58.808959Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping
Feb  9 00:16:58.812647 waagent[1404]: 2024-02-09T00:16:58.812579Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions.
Feb  9 00:16:58.818323 waagent[1404]: 2024-02-09T00:16:58.818254Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent
Feb  9 00:16:59.086677 waagent[1466]: 2024-02-09T00:16:59.086504Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent
Feb  9 00:16:59.087401 waagent[1466]: 2024-02-09T00:16:59.087329Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Feb  9 00:16:59.087571 waagent[1466]: 2024-02-09T00:16:59.087514Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Feb  9 00:16:59.098691 waagent[1466]: 2024-02-09T00:16:59.098615Z INFO ExtHandler ExtHandler Forcing an update of the goal state..
Feb  9 00:16:59.098862 waagent[1466]: 2024-02-09T00:16:59.098808Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1]
Feb  9 00:16:59.159858 waagent[1466]: 2024-02-09T00:16:59.159728Z INFO ExtHandler ExtHandler Found private key matching thumbprint 6B33792653012471E3B41270C09EB62D698A30D7
Feb  9 00:16:59.160083 waagent[1466]: 2024-02-09T00:16:59.160021Z INFO ExtHandler ExtHandler Certificate with thumbprint 0EB7847603E6362A012546B2C2D16731AD8AAD3E has no matching private key.
Feb  9 00:16:59.160321 waagent[1466]: 2024-02-09T00:16:59.160270Z INFO ExtHandler ExtHandler Fetch goal state completed
Feb  9 00:16:59.174164 waagent[1466]: 2024-02-09T00:16:59.174101Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: bc5ed1e0-1925-493b-8fdf-c7c2c1e809a6 New eTag: 12573242032570228849]
Feb  9 00:16:59.174743 waagent[1466]: 2024-02-09T00:16:59.174684Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob
Feb  9 00:16:59.258975 waagent[1466]: 2024-02-09T00:16:59.258823Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1;
Feb  9 00:16:59.285796 waagent[1466]: 2024-02-09T00:16:59.285703Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1466
Feb  9 00:16:59.289381 waagent[1466]: 2024-02-09T00:16:59.289305Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk']
Feb  9 00:16:59.290669 waagent[1466]: 2024-02-09T00:16:59.290604Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Feb  9 00:16:59.364737 waagent[1466]: 2024-02-09T00:16:59.364620Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service
Feb  9 00:16:59.365104 waagent[1466]: 2024-02-09T00:16:59.365034Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup
Feb  9 00:16:59.373331 waagent[1466]: 2024-02-09T00:16:59.373274Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now
Feb  9 00:16:59.373836 waagent[1466]: 2024-02-09T00:16:59.373771Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service'
Feb  9 00:16:59.374902 waagent[1466]: 2024-02-09T00:16:59.374835Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True]
Feb  9 00:16:59.376181 waagent[1466]: 2024-02-09T00:16:59.376120Z INFO ExtHandler ExtHandler Starting env monitor service.
Feb  9 00:16:59.376804 waagent[1466]: 2024-02-09T00:16:59.376745Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Feb  9 00:16:59.377434 waagent[1466]: 2024-02-09T00:16:59.377371Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Feb  9 00:16:59.377543 waagent[1466]: 2024-02-09T00:16:59.377472Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Feb  9 00:16:59.378273 waagent[1466]: 2024-02-09T00:16:59.378210Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Feb  9 00:16:59.378427 waagent[1466]: 2024-02-09T00:16:59.378374Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Feb  9 00:16:59.378526 waagent[1466]: 2024-02-09T00:16:59.378456Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Feb  9 00:16:59.378752 waagent[1466]: 2024-02-09T00:16:59.378698Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Feb  9 00:16:59.380151 waagent[1466]: 2024-02-09T00:16:59.380097Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Feb  9 00:16:59.380480 waagent[1466]: 2024-02-09T00:16:59.380424Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Feb  9 00:16:59.382523 waagent[1466]: 2024-02-09T00:16:59.382444Z INFO EnvHandler ExtHandler Configure routes
Feb  9 00:16:59.382730 waagent[1466]: 2024-02-09T00:16:59.382636Z INFO EnvHandler ExtHandler Gateway:None
Feb  9 00:16:59.382902 waagent[1466]: 2024-02-09T00:16:59.382834Z INFO EnvHandler ExtHandler Routes:None
Feb  9 00:16:59.383142 waagent[1466]: 2024-02-09T00:16:59.383072Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Feb  9 00:16:59.383755 waagent[1466]: 2024-02-09T00:16:59.383682Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Feb  9 00:16:59.390344 waagent[1466]: 2024-02-09T00:16:59.390280Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Feb  9 00:16:59.390344 waagent[1466]: Iface        Destination        Gateway         Flags        RefCnt        Use        Metric        Mask                MTU        Window        IRTT
Feb  9 00:16:59.390344 waagent[1466]: eth0        00000000        0108C80A        0003        0        0        1024        00000000        0        0        0
Feb  9 00:16:59.390344 waagent[1466]: eth0        0008C80A        00000000        0001        0        0        1024        00FFFFFF        0        0        0
Feb  9 00:16:59.390344 waagent[1466]: eth0        0108C80A        00000000        0005        0        0        1024        FFFFFFFF        0        0        0
Feb  9 00:16:59.390344 waagent[1466]: eth0        10813FA8        0108C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Feb  9 00:16:59.390344 waagent[1466]: eth0        FEA9FEA9        0108C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Feb  9 00:16:59.397220 waagent[1466]: 2024-02-09T00:16:59.397151Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Feb  9 00:16:59.398546 waagent[1466]: 2024-02-09T00:16:59.398473Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required
Feb  9 00:16:59.399974 waagent[1466]: 2024-02-09T00:16:59.399910Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders'
Feb  9 00:16:59.440016 waagent[1466]: 2024-02-09T00:16:59.439945Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1457'
Feb  9 00:16:59.446025 waagent[1466]: 2024-02-09T00:16:59.445957Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel.
Feb  9 00:16:59.632542 waagent[1466]: 2024-02-09T00:16:59.632391Z INFO MonitorHandler ExtHandler Network interfaces:
Feb  9 00:16:59.632542 waagent[1466]: Executing ['ip', '-a', '-o', 'link']:
Feb  9 00:16:59.632542 waagent[1466]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Feb  9 00:16:59.632542 waagent[1466]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:0d:3a:b0:ff:bc brd ff:ff:ff:ff:ff:ff
Feb  9 00:16:59.632542 waagent[1466]: 3: enP36024s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\    link/ether 00:0d:3a:b0:ff:bc brd ff:ff:ff:ff:ff:ff\    altname enP36024p0s2
Feb  9 00:16:59.632542 waagent[1466]: Executing ['ip', '-4', '-a', '-o', 'address']:
Feb  9 00:16:59.632542 waagent[1466]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Feb  9 00:16:59.632542 waagent[1466]: 2: eth0    inet 10.200.8.12/24 metric 1024 brd 10.200.8.255 scope global eth0\       valid_lft forever preferred_lft forever
Feb  9 00:16:59.632542 waagent[1466]: Executing ['ip', '-6', '-a', '-o', 'address']:
Feb  9 00:16:59.632542 waagent[1466]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Feb  9 00:16:59.632542 waagent[1466]: 2: eth0    inet6 fe80::20d:3aff:feb0:ffbc/64 scope link \       valid_lft forever preferred_lft forever
Feb  9 00:16:59.775403 waagent[1466]: 2024-02-09T00:16:59.775325Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting
Feb  9 00:16:59.820767 waagent[1404]: 2024-02-09T00:16:59.820637Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running
Feb  9 00:16:59.826994 waagent[1404]: 2024-02-09T00:16:59.826928Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent
Feb  9 00:17:00.846102 waagent[1497]: 2024-02-09T00:17:00.845990Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1)
Feb  9 00:17:00.846791 waagent[1497]: 2024-02-09T00:17:00.846723Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2
Feb  9 00:17:00.846937 waagent[1497]: 2024-02-09T00:17:00.846882Z INFO ExtHandler ExtHandler Python: 3.9.16
Feb  9 00:17:00.856506 waagent[1497]: 2024-02-09T00:17:00.856398Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1;
Feb  9 00:17:00.856899 waagent[1497]: 2024-02-09T00:17:00.856841Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Feb  9 00:17:00.857067 waagent[1497]: 2024-02-09T00:17:00.857015Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Feb  9 00:17:00.868459 waagent[1497]: 2024-02-09T00:17:00.868383Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1]
Feb  9 00:17:00.878220 waagent[1497]: 2024-02-09T00:17:00.878158Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143
Feb  9 00:17:00.879126 waagent[1497]: 2024-02-09T00:17:00.879063Z INFO ExtHandler
Feb  9 00:17:00.879277 waagent[1497]: 2024-02-09T00:17:00.879224Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 01d44651-2b68-4073-b8d2-6903649c93b6 eTag: 12573242032570228849 source: Fabric]
Feb  9 00:17:00.880043 waagent[1497]: 2024-02-09T00:17:00.879980Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them.
Feb  9 00:17:00.881143 waagent[1497]: 2024-02-09T00:17:00.881080Z INFO ExtHandler
Feb  9 00:17:00.881279 waagent[1497]: 2024-02-09T00:17:00.881226Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1]
Feb  9 00:17:00.888054 waagent[1497]: 2024-02-09T00:17:00.887999Z INFO ExtHandler ExtHandler Downloading artifacts profile blob
Feb  9 00:17:00.888479 waagent[1497]: 2024-02-09T00:17:00.888429Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required
Feb  9 00:17:00.909149 waagent[1497]: 2024-02-09T00:17:00.909077Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel.
Feb  9 00:17:00.973508 waagent[1497]: 2024-02-09T00:17:00.973355Z INFO ExtHandler Downloaded certificate {'thumbprint': '6B33792653012471E3B41270C09EB62D698A30D7', 'hasPrivateKey': True}
Feb  9 00:17:00.974501 waagent[1497]: 2024-02-09T00:17:00.974402Z INFO ExtHandler Downloaded certificate {'thumbprint': '0EB7847603E6362A012546B2C2D16731AD8AAD3E', 'hasPrivateKey': False}
Feb  9 00:17:00.975474 waagent[1497]: 2024-02-09T00:17:00.975408Z INFO ExtHandler Fetch goal state completed
Feb  9 00:17:00.995022 waagent[1497]: 2024-02-09T00:17:00.994946Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1497
Feb  9 00:17:00.998231 waagent[1497]: 2024-02-09T00:17:00.998165Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk']
Feb  9 00:17:00.999699 waagent[1497]: 2024-02-09T00:17:00.999640Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Feb  9 00:17:01.004622 waagent[1497]: 2024-02-09T00:17:01.004565Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service
Feb  9 00:17:01.004992 waagent[1497]: 2024-02-09T00:17:01.004933Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup
Feb  9 00:17:01.012844 waagent[1497]: 2024-02-09T00:17:01.012789Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now
Feb  9 00:17:01.013310 waagent[1497]: 2024-02-09T00:17:01.013252Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service'
Feb  9 00:17:01.019247 waagent[1497]: 2024-02-09T00:17:01.019147Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up.
Feb  9 00:17:01.023904 waagent[1497]: 2024-02-09T00:17:01.023843Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True]
Feb  9 00:17:01.025301 waagent[1497]: 2024-02-09T00:17:01.025240Z INFO ExtHandler ExtHandler Starting env monitor service.
Feb  9 00:17:01.025651 waagent[1497]: 2024-02-09T00:17:01.025593Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Feb  9 00:17:01.026047 waagent[1497]: 2024-02-09T00:17:01.025989Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Feb  9 00:17:01.026594 waagent[1497]: 2024-02-09T00:17:01.026534Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Feb  9 00:17:01.027025 waagent[1497]: 2024-02-09T00:17:01.026968Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Feb  9 00:17:01.027770 waagent[1497]: 2024-02-09T00:17:01.027708Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Feb  9 00:17:01.027770 waagent[1497]: Iface        Destination        Gateway         Flags        RefCnt        Use        Metric        Mask                MTU        Window        IRTT
Feb  9 00:17:01.027770 waagent[1497]: eth0        00000000        0108C80A        0003        0        0        1024        00000000        0        0        0
Feb  9 00:17:01.027770 waagent[1497]: eth0        0008C80A        00000000        0001        0        0        1024        00FFFFFF        0        0        0
Feb  9 00:17:01.027770 waagent[1497]: eth0        0108C80A        00000000        0005        0        0        1024        FFFFFFFF        0        0        0
Feb  9 00:17:01.027770 waagent[1497]: eth0        10813FA8        0108C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Feb  9 00:17:01.027770 waagent[1497]: eth0        FEA9FEA9        0108C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Feb  9 00:17:01.028048 waagent[1497]: 2024-02-09T00:17:01.027810Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Feb  9 00:17:01.028048 waagent[1497]: 2024-02-09T00:17:01.027974Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Feb  9 00:17:01.028423 waagent[1497]: 2024-02-09T00:17:01.028358Z INFO EnvHandler ExtHandler Configure routes
Feb  9 00:17:01.028646 waagent[1497]: 2024-02-09T00:17:01.028593Z INFO EnvHandler ExtHandler Gateway:None
Feb  9 00:17:01.029011 waagent[1497]: 2024-02-09T00:17:01.028951Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Feb  9 00:17:01.030883 waagent[1497]: 2024-02-09T00:17:01.030765Z INFO EnvHandler ExtHandler Routes:None
Feb  9 00:17:01.031146 waagent[1497]: 2024-02-09T00:17:01.031074Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Feb  9 00:17:01.033152 waagent[1497]: 2024-02-09T00:17:01.033014Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Feb  9 00:17:01.035506 waagent[1497]: 2024-02-09T00:17:01.035333Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Feb  9 00:17:01.045458 waagent[1497]: 2024-02-09T00:17:01.045344Z INFO MonitorHandler ExtHandler Network interfaces:
Feb  9 00:17:01.045458 waagent[1497]: Executing ['ip', '-a', '-o', 'link']:
Feb  9 00:17:01.045458 waagent[1497]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Feb  9 00:17:01.045458 waagent[1497]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:0d:3a:b0:ff:bc brd ff:ff:ff:ff:ff:ff
Feb  9 00:17:01.045458 waagent[1497]: 3: enP36024s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\    link/ether 00:0d:3a:b0:ff:bc brd ff:ff:ff:ff:ff:ff\    altname enP36024p0s2
Feb  9 00:17:01.045458 waagent[1497]: Executing ['ip', '-4', '-a', '-o', 'address']:
Feb  9 00:17:01.045458 waagent[1497]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Feb  9 00:17:01.045458 waagent[1497]: 2: eth0    inet 10.200.8.12/24 metric 1024 brd 10.200.8.255 scope global eth0\       valid_lft forever preferred_lft forever
Feb  9 00:17:01.045458 waagent[1497]: Executing ['ip', '-6', '-a', '-o', 'address']:
Feb  9 00:17:01.045458 waagent[1497]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Feb  9 00:17:01.045458 waagent[1497]: 2: eth0    inet6 fe80::20d:3aff:feb0:ffbc/64 scope link \       valid_lft forever preferred_lft forever
Feb  9 00:17:01.052532 waagent[1497]: 2024-02-09T00:17:01.052295Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Feb  9 00:17:01.060850 waagent[1497]: 2024-02-09T00:17:01.060790Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod)
Feb  9 00:17:01.062438 waagent[1497]: 2024-02-09T00:17:01.062385Z INFO ExtHandler ExtHandler Downloading manifest
Feb  9 00:17:01.128402 waagent[1497]: 2024-02-09T00:17:01.128285Z INFO ExtHandler ExtHandler
Feb  9 00:17:01.128558 waagent[1497]: 2024-02-09T00:17:01.128445Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: b3480993-9bba-4926-b9b4-12de4294af07 correlation d554fc6c-935a-4be9-9ab2-80bf2ccc2184 created: 2024-02-09T00:15:03.589783Z]
Feb  9 00:17:01.129468 waagent[1497]: 2024-02-09T00:17:01.129397Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything.
Feb  9 00:17:01.131620 waagent[1497]: 2024-02-09T00:17:01.131557Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms]
Feb  9 00:17:01.166276 waagent[1497]: 2024-02-09T00:17:01.166191Z INFO ExtHandler ExtHandler Looking for existing remote access users.
Feb  9 00:17:01.177787 waagent[1497]: 2024-02-09T00:17:01.177710Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: F9416763-E28C-4F86-9532-71DBEA8D5E3D;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Feb  9 00:17:01.195411 waagent[1497]: 2024-02-09T00:17:01.195305Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules:
Feb  9 00:17:01.195411 waagent[1497]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
Feb  9 00:17:01.195411 waagent[1497]:     pkts      bytes target     prot opt in     out     source               destination
Feb  9 00:17:01.195411 waagent[1497]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
Feb  9 00:17:01.195411 waagent[1497]:     pkts      bytes target     prot opt in     out     source               destination
Feb  9 00:17:01.195411 waagent[1497]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
Feb  9 00:17:01.195411 waagent[1497]:     pkts      bytes target     prot opt in     out     source               destination
Feb  9 00:17:01.195411 waagent[1497]:        0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        tcp dpt:53
Feb  9 00:17:01.195411 waagent[1497]:        0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        owner UID match 0
Feb  9 00:17:01.195411 waagent[1497]:        0        0 DROP       tcp  --  *      *       0.0.0.0/0            168.63.129.16        ctstate INVALID,NEW
Feb  9 00:17:01.202476 waagent[1497]: 2024-02-09T00:17:01.202375Z INFO EnvHandler ExtHandler Current Firewall rules:
Feb  9 00:17:01.202476 waagent[1497]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
Feb  9 00:17:01.202476 waagent[1497]:     pkts      bytes target     prot opt in     out     source               destination
Feb  9 00:17:01.202476 waagent[1497]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
Feb  9 00:17:01.202476 waagent[1497]:     pkts      bytes target     prot opt in     out     source               destination
Feb  9 00:17:01.202476 waagent[1497]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
Feb  9 00:17:01.202476 waagent[1497]:     pkts      bytes target     prot opt in     out     source               destination
Feb  9 00:17:01.202476 waagent[1497]:        0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        tcp dpt:53
Feb  9 00:17:01.202476 waagent[1497]:        0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        owner UID match 0
Feb  9 00:17:01.202476 waagent[1497]:        0        0 DROP       tcp  --  *      *       0.0.0.0/0            168.63.129.16        ctstate INVALID,NEW
Feb  9 00:17:01.203064 waagent[1497]: 2024-02-09T00:17:01.203010Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300
Feb  9 00:17:02.878882 systemd-timesyncd[1263]: Timed out waiting for reply from 162.159.200.123:123 (0.flatcar.pool.ntp.org).
Feb  9 00:17:02.882124 systemd-timesyncd[1263]: Contacted time server 85.91.1.180:123 (0.flatcar.pool.ntp.org).
Feb  9 00:17:02.882192 systemd-timesyncd[1263]: Initial clock synchronization to Fri 2024-02-09 00:17:02.883631 UTC.
Feb  9 00:17:26.658644 kernel: hv_balloon: Max. dynamic memory size: 8192 MB
Feb  9 00:17:34.722639 update_engine[1304]: I0209 00:17:34.722553  1304 update_attempter.cc:509] Updating boot flags...
Feb  9 00:17:41.266247 systemd[1]: Created slice system-sshd.slice.
Feb  9 00:17:41.268125 systemd[1]: Started sshd@0-10.200.8.12:22-10.200.12.6:43054.service.
Feb  9 00:17:42.116259 sshd[1587]: Accepted publickey for core from 10.200.12.6 port 43054 ssh2: RSA SHA256:B5HZEiOGIeAXpzW5I8aXPtlchVYKYAvy/eBEUvZzqu4
Feb  9 00:17:42.117917 sshd[1587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 00:17:42.122379 systemd-logind[1301]: New session 3 of user core.
Feb  9 00:17:42.123229 systemd[1]: Started session-3.scope.
Feb  9 00:17:42.667781 systemd[1]: Started sshd@1-10.200.8.12:22-10.200.12.6:43066.service.
Feb  9 00:17:43.283799 sshd[1592]: Accepted publickey for core from 10.200.12.6 port 43066 ssh2: RSA SHA256:B5HZEiOGIeAXpzW5I8aXPtlchVYKYAvy/eBEUvZzqu4
Feb  9 00:17:43.285416 sshd[1592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 00:17:43.290775 systemd[1]: Started session-4.scope.
Feb  9 00:17:43.291209 systemd-logind[1301]: New session 4 of user core.
Feb  9 00:17:43.721257 sshd[1592]: pam_unix(sshd:session): session closed for user core
Feb  9 00:17:43.724473 systemd[1]: sshd@1-10.200.8.12:22-10.200.12.6:43066.service: Deactivated successfully.
Feb  9 00:17:43.725471 systemd[1]: session-4.scope: Deactivated successfully.
Feb  9 00:17:43.726238 systemd-logind[1301]: Session 4 logged out. Waiting for processes to exit.
Feb  9 00:17:43.727040 systemd-logind[1301]: Removed session 4.
Feb  9 00:17:43.825729 systemd[1]: Started sshd@2-10.200.8.12:22-10.200.12.6:43070.service.
Feb  9 00:17:44.444649 sshd[1598]: Accepted publickey for core from 10.200.12.6 port 43070 ssh2: RSA SHA256:B5HZEiOGIeAXpzW5I8aXPtlchVYKYAvy/eBEUvZzqu4
Feb  9 00:17:44.446271 sshd[1598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 00:17:44.451827 systemd[1]: Started session-5.scope.
Feb  9 00:17:44.452402 systemd-logind[1301]: New session 5 of user core.
Feb  9 00:17:44.877699 sshd[1598]: pam_unix(sshd:session): session closed for user core
Feb  9 00:17:44.880758 systemd[1]: sshd@2-10.200.8.12:22-10.200.12.6:43070.service: Deactivated successfully.
Feb  9 00:17:44.881616 systemd[1]: session-5.scope: Deactivated successfully.
Feb  9 00:17:44.882229 systemd-logind[1301]: Session 5 logged out. Waiting for processes to exit.
Feb  9 00:17:44.882961 systemd-logind[1301]: Removed session 5.
Feb  9 00:17:45.036187 systemd[1]: Started sshd@3-10.200.8.12:22-10.200.12.6:43084.service.
Feb  9 00:17:45.659789 sshd[1604]: Accepted publickey for core from 10.200.12.6 port 43084 ssh2: RSA SHA256:B5HZEiOGIeAXpzW5I8aXPtlchVYKYAvy/eBEUvZzqu4
Feb  9 00:17:45.661404 sshd[1604]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 00:17:45.666525 systemd[1]: Started session-6.scope.
Feb  9 00:17:45.667116 systemd-logind[1301]: New session 6 of user core.
Feb  9 00:17:46.099811 sshd[1604]: pam_unix(sshd:session): session closed for user core
Feb  9 00:17:46.103117 systemd[1]: sshd@3-10.200.8.12:22-10.200.12.6:43084.service: Deactivated successfully.
Feb  9 00:17:46.104098 systemd[1]: session-6.scope: Deactivated successfully.
Feb  9 00:17:46.104871 systemd-logind[1301]: Session 6 logged out. Waiting for processes to exit.
Feb  9 00:17:46.105765 systemd-logind[1301]: Removed session 6.
Feb  9 00:17:46.206817 systemd[1]: Started sshd@4-10.200.8.12:22-10.200.12.6:43096.service.
Feb  9 00:17:46.835812 sshd[1610]: Accepted publickey for core from 10.200.12.6 port 43096 ssh2: RSA SHA256:B5HZEiOGIeAXpzW5I8aXPtlchVYKYAvy/eBEUvZzqu4
Feb  9 00:17:46.837408 sshd[1610]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 00:17:46.842975 systemd[1]: Started session-7.scope.
Feb  9 00:17:46.843727 systemd-logind[1301]: New session 7 of user core.
Feb  9 00:17:47.403725 sudo[1613]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Feb  9 00:17:47.403989 sudo[1613]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 00:17:47.411682 dbus-daemon[1288]: \xd0\u000dE\u0012\x97U:  received setenforce notice (enforcing=2067732256)
Feb  9 00:17:47.413465 sudo[1613]: pam_unix(sudo:session): session closed for user root
Feb  9 00:17:47.532544 sshd[1610]: pam_unix(sshd:session): session closed for user core
Feb  9 00:17:47.535856 systemd[1]: sshd@4-10.200.8.12:22-10.200.12.6:43096.service: Deactivated successfully.
Feb  9 00:17:47.536917 systemd[1]: session-7.scope: Deactivated successfully.
Feb  9 00:17:47.537556 systemd-logind[1301]: Session 7 logged out. Waiting for processes to exit.
Feb  9 00:17:47.538338 systemd-logind[1301]: Removed session 7.
Feb  9 00:17:47.635572 systemd[1]: Started sshd@5-10.200.8.12:22-10.200.12.6:41426.service.
Feb  9 00:17:48.284162 sshd[1617]: Accepted publickey for core from 10.200.12.6 port 41426 ssh2: RSA SHA256:B5HZEiOGIeAXpzW5I8aXPtlchVYKYAvy/eBEUvZzqu4
Feb  9 00:17:48.285858 sshd[1617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 00:17:48.290918 systemd[1]: Started session-8.scope.
Feb  9 00:17:48.291515 systemd-logind[1301]: New session 8 of user core.
Feb  9 00:17:48.627178 sudo[1621]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Feb  9 00:17:48.627749 sudo[1621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 00:17:48.630321 sudo[1621]: pam_unix(sudo:session): session closed for user root
Feb  9 00:17:48.634750 sudo[1620]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Feb  9 00:17:48.635004 sudo[1620]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 00:17:48.643454 systemd[1]: Stopping audit-rules.service...
Feb  9 00:17:48.643000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Feb  9 00:17:48.645592 auditctl[1624]: No rules
Feb  9 00:17:48.652558 kernel: kauditd_printk_skb: 4 callbacks suppressed
Feb  9 00:17:48.652625 kernel: audit: type=1305 audit(1707437868.643:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Feb  9 00:17:48.647708 systemd[1]: audit-rules.service: Deactivated successfully.
Feb  9 00:17:48.647858 systemd[1]: Stopped audit-rules.service.
Feb  9 00:17:48.649282 systemd[1]: Starting audit-rules.service...
Feb  9 00:17:48.643000 audit[1624]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea20ad940 a2=420 a3=0 items=0 ppid=1 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:48.670554 augenrules[1641]: No rules
Feb  9 00:17:48.672069 kernel: audit: type=1300 audit(1707437868.643:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea20ad940 a2=420 a3=0 items=0 ppid=1 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:48.671293 systemd[1]: Finished audit-rules.service.
Feb  9 00:17:48.674508 kernel: audit: type=1327 audit(1707437868.643:167): proctitle=2F7362696E2F617564697463746C002D44
Feb  9 00:17:48.643000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Feb  9 00:17:48.672363 sudo[1620]: pam_unix(sudo:session): session closed for user root
Feb  9 00:17:48.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.688367 kernel: audit: type=1131 audit(1707437868.646:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.688425 kernel: audit: type=1130 audit(1707437868.670:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.670000 audit[1620]: USER_END pid=1620 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.699504 kernel: audit: type=1106 audit(1707437868.670:170): pid=1620 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.670000 audit[1620]: CRED_DISP pid=1620 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.723777 kernel: audit: type=1104 audit(1707437868.670:171): pid=1620 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.772058 sshd[1617]: pam_unix(sshd:session): session closed for user core
Feb  9 00:17:48.772000 audit[1617]: USER_END pid=1617 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:17:48.775340 systemd[1]: sshd@5-10.200.8.12:22-10.200.12.6:41426.service: Deactivated successfully.
Feb  9 00:17:48.776298 systemd[1]: session-8.scope: Deactivated successfully.
Feb  9 00:17:48.777575 systemd-logind[1301]: Session 8 logged out. Waiting for processes to exit.
Feb  9 00:17:48.778438 systemd-logind[1301]: Removed session 8.
Feb  9 00:17:48.772000 audit[1617]: CRED_DISP pid=1617 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:17:48.802280 kernel: audit: type=1106 audit(1707437868.772:172): pid=1617 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:17:48.802349 kernel: audit: type=1104 audit(1707437868.772:173): pid=1617 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:17:48.802374 kernel: audit: type=1131 audit(1707437868.774:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.12:22-10.200.12.6:41426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.12:22-10.200.12.6:41426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.12:22-10.200.12.6:41438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:48.877988 systemd[1]: Started sshd@6-10.200.8.12:22-10.200.12.6:41438.service.
Feb  9 00:17:49.503000 audit[1647]: USER_ACCT pid=1647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:17:49.505370 sshd[1647]: Accepted publickey for core from 10.200.12.6 port 41438 ssh2: RSA SHA256:B5HZEiOGIeAXpzW5I8aXPtlchVYKYAvy/eBEUvZzqu4
Feb  9 00:17:49.505000 audit[1647]: CRED_ACQ pid=1647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:17:49.505000 audit[1647]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc49714d50 a2=3 a3=0 items=0 ppid=1 pid=1647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:49.505000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 00:17:49.507082 sshd[1647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 00:17:49.512093 systemd[1]: Started session-9.scope.
Feb  9 00:17:49.512563 systemd-logind[1301]: New session 9 of user core.
Feb  9 00:17:49.515000 audit[1647]: USER_START pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:17:49.516000 audit[1649]: CRED_ACQ pid=1649 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:17:49.846000 audit[1650]: USER_ACCT pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:49.846000 audit[1650]: CRED_REFR pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:49.848119 sudo[1650]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Feb  9 00:17:49.848380 sudo[1650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 00:17:49.848000 audit[1650]: USER_START pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:50.801473 systemd[1]: Reloading.
Feb  9 00:17:50.891891 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-02-09T00:17:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 00:17:50.891927 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-02-09T00:17:50Z" level=info msg="torcx already run"
Feb  9 00:17:50.975340 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 00:17:50.975360 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 00:17:50.993186 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit: BPF prog-id=32 op=LOAD
Feb  9 00:17:51.056000 audit: BPF prog-id=21 op=UNLOAD
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit: BPF prog-id=33 op=LOAD
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.056000 audit: BPF prog-id=34 op=LOAD
Feb  9 00:17:51.056000 audit: BPF prog-id=22 op=UNLOAD
Feb  9 00:17:51.056000 audit: BPF prog-id=23 op=UNLOAD
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.057000 audit: BPF prog-id=35 op=LOAD
Feb  9 00:17:51.057000 audit: BPF prog-id=31 op=UNLOAD
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.061000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit: BPF prog-id=36 op=LOAD
Feb  9 00:17:51.062000 audit: BPF prog-id=15 op=UNLOAD
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit: BPF prog-id=37 op=LOAD
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit: BPF prog-id=38 op=LOAD
Feb  9 00:17:51.062000 audit: BPF prog-id=16 op=UNLOAD
Feb  9 00:17:51.062000 audit: BPF prog-id=17 op=UNLOAD
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit: BPF prog-id=39 op=LOAD
Feb  9 00:17:51.063000 audit: BPF prog-id=25 op=UNLOAD
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.063000 audit: BPF prog-id=40 op=LOAD
Feb  9 00:17:51.063000 audit: BPF prog-id=29 op=UNLOAD
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit: BPF prog-id=41 op=LOAD
Feb  9 00:17:51.065000 audit: BPF prog-id=26 op=UNLOAD
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit: BPF prog-id=42 op=LOAD
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit: BPF prog-id=43 op=LOAD
Feb  9 00:17:51.065000 audit: BPF prog-id=27 op=UNLOAD
Feb  9 00:17:51.065000 audit: BPF prog-id=28 op=UNLOAD
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit: BPF prog-id=44 op=LOAD
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.066000 audit: BPF prog-id=45 op=LOAD
Feb  9 00:17:51.066000 audit: BPF prog-id=18 op=UNLOAD
Feb  9 00:17:51.066000 audit: BPF prog-id=19 op=UNLOAD
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:51.068000 audit: BPF prog-id=46 op=LOAD
Feb  9 00:17:51.068000 audit: BPF prog-id=24 op=UNLOAD
Feb  9 00:17:51.079813 systemd[1]: Started kubelet.service.
Feb  9 00:17:51.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:51.108595 systemd[1]: Starting coreos-metadata.service...
Feb  9 00:17:51.137547 kubelet[1742]: E0209 00:17:51.137473    1742 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Feb  9 00:17:51.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 00:17:51.139252 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 00:17:51.139367 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 00:17:51.162139 coreos-metadata[1750]: Feb 09 00:17:51.162 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1
Feb  9 00:17:51.164845 coreos-metadata[1750]: Feb 09 00:17:51.164 INFO Fetch successful
Feb  9 00:17:51.164845 coreos-metadata[1750]: Feb 09 00:17:51.164 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1
Feb  9 00:17:51.166609 coreos-metadata[1750]: Feb 09 00:17:51.166 INFO Fetch successful
Feb  9 00:17:51.166786 coreos-metadata[1750]: Feb 09 00:17:51.166 INFO Fetching http://168.63.129.16/machine/1b03196d-2c32-422b-9753-459972206411/48562131%2D1978%2D4917%2D8af3%2De5a4cae2b45d.%5Fci%2D3510.3.2%2Da%2Df6a0525c7f?comp=config&type=sharedConfig&incarnation=1: Attempt #1
Feb  9 00:17:51.168588 coreos-metadata[1750]: Feb 09 00:17:51.168 INFO Fetch successful
Feb  9 00:17:51.200418 coreos-metadata[1750]: Feb 09 00:17:51.200 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1
Feb  9 00:17:51.209949 coreos-metadata[1750]: Feb 09 00:17:51.209 INFO Fetch successful
Feb  9 00:17:51.218524 systemd[1]: Finished coreos-metadata.service.
Feb  9 00:17:51.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:54.623174 systemd[1]: Stopped kubelet.service.
Feb  9 00:17:54.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:54.626789 kernel: kauditd_printk_skb: 186 callbacks suppressed
Feb  9 00:17:54.626861 kernel: audit: type=1130 audit(1707437874.621:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:54.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:54.649514 kernel: audit: type=1131 audit(1707437874.621:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:54.648521 systemd[1]: Reloading.
Feb  9 00:17:54.734997 /usr/lib/systemd/system-generators/torcx-generator[1807]: time="2024-02-09T00:17:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 00:17:54.735036 /usr/lib/systemd/system-generators/torcx-generator[1807]: time="2024-02-09T00:17:54Z" level=info msg="torcx already run"
Feb  9 00:17:54.820024 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 00:17:54.820045 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 00:17:54.838044 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.930031 kernel: audit: type=1400 audit(1707437874.901:361): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.930120 kernel: audit: type=1400 audit(1707437874.901:362): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.930144 kernel: audit: type=1400 audit(1707437874.901:363): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.956105 kernel: audit: type=1400 audit(1707437874.901:364): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.956170 kernel: audit: type=1400 audit(1707437874.901:365): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.996163 kernel: audit: type=1400 audit(1707437874.901:366): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.996224 kernel: audit: type=1400 audit(1707437874.901:367): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.996244 kernel: audit: type=1400 audit(1707437874.901:368): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.901000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit: BPF prog-id=47 op=LOAD
Feb  9 00:17:54.916000 audit: BPF prog-id=32 op=UNLOAD
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.916000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit: BPF prog-id=48 op=LOAD
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit: BPF prog-id=49 op=LOAD
Feb  9 00:17:54.968000 audit: BPF prog-id=33 op=UNLOAD
Feb  9 00:17:54.968000 audit: BPF prog-id=34 op=UNLOAD
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:54.968000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.009000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.009000 audit: BPF prog-id=50 op=LOAD
Feb  9 00:17:55.009000 audit: BPF prog-id=35 op=UNLOAD
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit: BPF prog-id=51 op=LOAD
Feb  9 00:17:55.012000 audit: BPF prog-id=36 op=UNLOAD
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit: BPF prog-id=52 op=LOAD
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.012000 audit: BPF prog-id=53 op=LOAD
Feb  9 00:17:55.012000 audit: BPF prog-id=37 op=UNLOAD
Feb  9 00:17:55.012000 audit: BPF prog-id=38 op=UNLOAD
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit: BPF prog-id=54 op=LOAD
Feb  9 00:17:55.013000 audit: BPF prog-id=39 op=UNLOAD
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.013000 audit: BPF prog-id=55 op=LOAD
Feb  9 00:17:55.013000 audit: BPF prog-id=40 op=UNLOAD
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit: BPF prog-id=56 op=LOAD
Feb  9 00:17:55.015000 audit: BPF prog-id=41 op=UNLOAD
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit: BPF prog-id=57 op=LOAD
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.015000 audit: BPF prog-id=58 op=LOAD
Feb  9 00:17:55.015000 audit: BPF prog-id=42 op=UNLOAD
Feb  9 00:17:55.015000 audit: BPF prog-id=43 op=UNLOAD
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit: BPF prog-id=59 op=LOAD
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.016000 audit: BPF prog-id=60 op=LOAD
Feb  9 00:17:55.016000 audit: BPF prog-id=44 op=UNLOAD
Feb  9 00:17:55.016000 audit: BPF prog-id=45 op=UNLOAD
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.019000 audit: BPF prog-id=61 op=LOAD
Feb  9 00:17:55.019000 audit: BPF prog-id=46 op=UNLOAD
Feb  9 00:17:55.038197 systemd[1]: Started kubelet.service.
Feb  9 00:17:55.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:17:55.083812 kubelet[1870]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 00:17:55.083812 kubelet[1870]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 00:17:55.084237 kubelet[1870]: I0209 00:17:55.083864    1870 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Feb  9 00:17:55.085245 kubelet[1870]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 00:17:55.085245 kubelet[1870]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 00:17:55.535946 kubelet[1870]: I0209 00:17:55.535907    1870 server.go:412] "Kubelet version" kubeletVersion="v1.26.5"
Feb  9 00:17:55.535946 kubelet[1870]: I0209 00:17:55.535936    1870 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Feb  9 00:17:55.536202 kubelet[1870]: I0209 00:17:55.536183    1870 server.go:836] "Client rotation is on, will bootstrap in background"
Feb  9 00:17:55.538234 kubelet[1870]: I0209 00:17:55.538211    1870 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Feb  9 00:17:55.541166 kubelet[1870]: I0209 00:17:55.541138    1870 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Feb  9 00:17:55.541367 kubelet[1870]: I0209 00:17:55.541349    1870 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Feb  9 00:17:55.541452 kubelet[1870]: I0209 00:17:55.541437    1870 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Feb  9 00:17:55.541598 kubelet[1870]: I0209 00:17:55.541465    1870 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Feb  9 00:17:55.541598 kubelet[1870]: I0209 00:17:55.541501    1870 container_manager_linux.go:308] "Creating device plugin manager"
Feb  9 00:17:55.541692 kubelet[1870]: I0209 00:17:55.541612    1870 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 00:17:55.544846 kubelet[1870]: I0209 00:17:55.544826    1870 kubelet.go:398] "Attempting to sync node with API server"
Feb  9 00:17:55.544943 kubelet[1870]: I0209 00:17:55.544862    1870 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests"
Feb  9 00:17:55.544943 kubelet[1870]: I0209 00:17:55.544890    1870 kubelet.go:297] "Adding apiserver pod source"
Feb  9 00:17:55.544943 kubelet[1870]: I0209 00:17:55.544909    1870 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Feb  9 00:17:55.545624 kubelet[1870]: E0209 00:17:55.545608    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:17:55.545763 kubelet[1870]: E0209 00:17:55.545738    1870 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:17:55.545869 kubelet[1870]: I0209 00:17:55.545853    1870 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Feb  9 00:17:55.546200 kubelet[1870]: W0209 00:17:55.546170    1870 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Feb  9 00:17:55.546656 kubelet[1870]: I0209 00:17:55.546618    1870 server.go:1186] "Started kubelet"
Feb  9 00:17:55.546869 kubelet[1870]: I0209 00:17:55.546849    1870 server.go:161] "Starting to listen" address="0.0.0.0" port=10250
Feb  9 00:17:55.547642 kubelet[1870]: I0209 00:17:55.547592    1870 server.go:451] "Adding debug handlers to kubelet server"
Feb  9 00:17:55.546000 audit[1870]: AVC avc:  denied  { mac_admin } for  pid=1870 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.546000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 00:17:55.546000 audit[1870]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ecfbf0 a1=c000bb8690 a2=c000ecfbc0 a3=25 items=0 ppid=1 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.546000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 00:17:55.548559 kubelet[1870]: I0209 00:17:55.548547    1870 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Feb  9 00:17:55.547000 audit[1870]: AVC avc:  denied  { mac_admin } for  pid=1870 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.547000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 00:17:55.547000 audit[1870]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b86620 a1=c000bb86a8 a2=c000ecfc80 a3=25 items=0 ppid=1 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.547000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 00:17:55.548936 kubelet[1870]: I0209 00:17:55.548923    1870 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Feb  9 00:17:55.549069 kubelet[1870]: I0209 00:17:55.549056    1870 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Feb  9 00:17:55.552218 kubelet[1870]: I0209 00:17:55.551047    1870 volume_manager.go:293] "Starting Kubelet Volume Manager"
Feb  9 00:17:55.552218 kubelet[1870]: I0209 00:17:55.551135    1870 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Feb  9 00:17:55.552218 kubelet[1870]: E0209 00:17:55.551404    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:17:55.554177 kubelet[1870]: E0209 00:17:55.554145    1870 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Feb  9 00:17:55.554269 kubelet[1870]: E0209 00:17:55.554181    1870 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Feb  9 00:17:55.566000 audit[1880]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.566000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9a943160 a2=0 a3=7fff9a94314c items=0 ppid=1870 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Feb  9 00:17:55.568000 audit[1881]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.568000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff703188e0 a2=0 a3=7fff703188cc items=0 ppid=1870 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Feb  9 00:17:55.570000 audit[1883]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.570000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff056ffe90 a2=0 a3=7fff056ffe7c items=0 ppid=1870 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 00:17:55.572000 audit[1885]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.572000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed30785e0 a2=0 a3=7ffed30785cc items=0 ppid=1870 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 00:17:55.589424 kubelet[1870]: W0209 00:17:55.589397    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 00:17:55.589533 kubelet[1870]: E0209 00:17:55.589435    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 00:17:55.589533 kubelet[1870]: E0209 00:17:55.589477    1870 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.200.8.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Feb  9 00:17:55.589533 kubelet[1870]: W0209 00:17:55.589524    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 00:17:55.589672 kubelet[1870]: E0209 00:17:55.589537    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 00:17:55.589672 kubelet[1870]: W0209 00:17:55.589572    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 00:17:55.589672 kubelet[1870]: E0209 00:17:55.589584    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 00:17:55.589783 kubelet[1870]: E0209 00:17:55.589630    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b390009c79", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 546594425, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 546594425, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.593919 kubelet[1870]: E0209 00:17:55.593844    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b390743461", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 554169953, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 554169953, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.602000 audit[1892]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.602000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd0cf4ab60 a2=0 a3=7ffd0cf4ab4c items=0 ppid=1870 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Feb  9 00:17:55.604000 audit[1893]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.604000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcb1391ae0 a2=0 a3=7ffcb1391acc items=0 ppid=1870 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Feb  9 00:17:55.606861 kubelet[1870]: I0209 00:17:55.606845    1870 cpu_manager.go:214] "Starting CPU manager" policy="none"
Feb  9 00:17:55.606967 kubelet[1870]: I0209 00:17:55.606957    1870 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Feb  9 00:17:55.607041 kubelet[1870]: I0209 00:17:55.607033    1870 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 00:17:55.611449 kubelet[1870]: I0209 00:17:55.611434    1870 policy_none.go:49] "None policy: Start"
Feb  9 00:17:55.611764 kubelet[1870]: E0209 00:17:55.611687    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a0677", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605931639, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605931639, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.612170 kubelet[1870]: I0209 00:17:55.612152    1870 memory_manager.go:169] "Starting memorymanager" policy="None"
Feb  9 00:17:55.612250 kubelet[1870]: I0209 00:17:55.612175    1870 state_mem.go:35] "Initializing new in-memory state store"
Feb  9 00:17:55.617556 kubelet[1870]: E0209 00:17:55.617474    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a22fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605938939, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605938939, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.618416 kubelet[1870]: E0209 00:17:55.618358    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a310b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605942539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605942539, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.620926 systemd[1]: Created slice kubepods.slice.
Feb  9 00:17:55.624892 systemd[1]: Created slice kubepods-burstable.slice.
Feb  9 00:17:55.628003 systemd[1]: Created slice kubepods-besteffort.slice.
Feb  9 00:17:55.635087 kubelet[1870]: I0209 00:17:55.635064    1870 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Feb  9 00:17:55.633000 audit[1870]: AVC avc:  denied  { mac_admin } for  pid=1870 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:17:55.633000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 00:17:55.633000 audit[1870]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010063c0 a1=c000f68f78 a2=c001006390 a3=25 items=0 ppid=1 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.633000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 00:17:55.635436 kubelet[1870]: I0209 00:17:55.635137    1870 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Feb  9 00:17:55.635436 kubelet[1870]: I0209 00:17:55.635315    1870 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Feb  9 00:17:55.637005 kubelet[1870]: E0209 00:17:55.636985    1870 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.12\" not found"
Feb  9 00:17:55.638646 kubelet[1870]: E0209 00:17:55.638582    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3956a9aa4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 637426852, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 637426852, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.644000 audit[1896]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.644000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdbad27a70 a2=0 a3=7ffdbad27a5c items=0 ppid=1870 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Feb  9 00:17:55.653035 kubelet[1870]: I0209 00:17:55.653013    1870 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.12"
Feb  9 00:17:55.654153 kubelet[1870]: E0209 00:17:55.654128    1870 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.12"
Feb  9 00:17:55.654439 kubelet[1870]: E0209 00:17:55.654377    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a0677", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605931639, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 652974207, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a0677" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.655244 kubelet[1870]: E0209 00:17:55.655188    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a22fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605938939, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 652979107, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a22fb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.656055 kubelet[1870]: E0209 00:17:55.656001    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a310b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605942539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 652981907, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a310b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.663000 audit[1899]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.663000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff4b0a6910 a2=0 a3=7fff4b0a68fc items=0 ppid=1870 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Feb  9 00:17:55.664000 audit[1900]: NETFILTER_CFG table=nat:13 family=2 entries=1 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.664000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd7e5c1980 a2=0 a3=7ffd7e5c196c items=0 ppid=1870 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Feb  9 00:17:55.665000 audit[1901]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.665000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9121b430 a2=0 a3=7fff9121b41c items=0 ppid=1870 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Feb  9 00:17:55.667000 audit[1903]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.667000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdf051a1f0 a2=0 a3=7ffdf051a1dc items=0 ppid=1870 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Feb  9 00:17:55.669000 audit[1905]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.669000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd8c116340 a2=0 a3=7ffd8c11632c items=0 ppid=1870 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Feb  9 00:17:55.716000 audit[1908]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.716000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc1fe26350 a2=0 a3=7ffc1fe2633c items=0 ppid=1870 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Feb  9 00:17:55.718000 audit[1910]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.718000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc86da31d0 a2=0 a3=7ffc86da31bc items=0 ppid=1870 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Feb  9 00:17:55.788000 audit[1913]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.788000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffe6ce8ccf0 a2=0 a3=7ffe6ce8ccdc items=0 ppid=1870 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Feb  9 00:17:55.790573 kubelet[1870]: I0209 00:17:55.790553    1870 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Feb  9 00:17:55.790000 audit[1914]: NETFILTER_CFG table=mangle:20 family=10 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.790000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc075c3740 a2=0 a3=7ffc075c372c items=0 ppid=1870 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Feb  9 00:17:55.791000 audit[1915]: NETFILTER_CFG table=mangle:21 family=2 entries=1 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.791000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe66782b20 a2=0 a3=7ffe66782b0c items=0 ppid=1870 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Feb  9 00:17:55.795348 kubelet[1870]: E0209 00:17:55.795328    1870 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.200.8.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Feb  9 00:17:55.794000 audit[1916]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.794000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9afbbc10 a2=0 a3=7ffd9afbbbfc items=0 ppid=1870 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Feb  9 00:17:55.795000 audit[1917]: NETFILTER_CFG table=nat:23 family=10 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.795000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe6396d280 a2=0 a3=7ffe6396d26c items=0 ppid=1870 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Feb  9 00:17:55.796000 audit[1918]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:17:55.796000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff93e40c50 a2=0 a3=7fff93e40c3c items=0 ppid=1870 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Feb  9 00:17:55.797000 audit[1920]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.797000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffabb541b0 a2=0 a3=7fffabb5419c items=0 ppid=1870 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Feb  9 00:17:55.798000 audit[1921]: NETFILTER_CFG table=filter:26 family=10 entries=2 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.798000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe373328f0 a2=0 a3=7ffe373328dc items=0 ppid=1870 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.798000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Feb  9 00:17:55.801000 audit[1923]: NETFILTER_CFG table=filter:27 family=10 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.801000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc24e1d4e0 a2=0 a3=7ffc24e1d4cc items=0 ppid=1870 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Feb  9 00:17:55.802000 audit[1924]: NETFILTER_CFG table=nat:28 family=10 entries=1 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.802000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc5f155de0 a2=0 a3=7ffc5f155dcc items=0 ppid=1870 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Feb  9 00:17:55.803000 audit[1925]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.803000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3565dfd0 a2=0 a3=7ffd3565dfbc items=0 ppid=1870 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.803000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Feb  9 00:17:55.805000 audit[1927]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.805000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe19639160 a2=0 a3=7ffe1963914c items=0 ppid=1870 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Feb  9 00:17:55.807000 audit[1929]: NETFILTER_CFG table=nat:31 family=10 entries=2 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.807000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc55c1ec40 a2=0 a3=7ffc55c1ec2c items=0 ppid=1870 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Feb  9 00:17:55.809000 audit[1931]: NETFILTER_CFG table=nat:32 family=10 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.809000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe141b8160 a2=0 a3=7ffe141b814c items=0 ppid=1870 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Feb  9 00:17:55.811000 audit[1933]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.811000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff0f42a1f0 a2=0 a3=7fff0f42a1dc items=0 ppid=1870 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Feb  9 00:17:55.829000 audit[1935]: NETFILTER_CFG table=nat:34 family=10 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.829000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd643a23e0 a2=0 a3=7ffd643a23cc items=0 ppid=1870 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Feb  9 00:17:55.831535 kubelet[1870]: I0209 00:17:55.831512    1870 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Feb  9 00:17:55.831535 kubelet[1870]: I0209 00:17:55.831536    1870 status_manager.go:176] "Starting to sync pod status with apiserver"
Feb  9 00:17:55.831666 kubelet[1870]: I0209 00:17:55.831558    1870 kubelet.go:2113] "Starting kubelet main sync loop"
Feb  9 00:17:55.831666 kubelet[1870]: E0209 00:17:55.831615    1870 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Feb  9 00:17:55.831000 audit[1936]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.831000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3ad56bc0 a2=0 a3=7ffe3ad56bac items=0 ppid=1870 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Feb  9 00:17:55.833695 kubelet[1870]: W0209 00:17:55.833676    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 00:17:55.833822 kubelet[1870]: E0209 00:17:55.833810    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 00:17:55.832000 audit[1937]: NETFILTER_CFG table=nat:36 family=10 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.832000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff000ba3c0 a2=0 a3=7fff000ba3ac items=0 ppid=1870 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Feb  9 00:17:55.833000 audit[1938]: NETFILTER_CFG table=filter:37 family=10 entries=1 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:17:55.833000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe42b9c570 a2=0 a3=7ffe42b9c55c items=0 ppid=1870 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:17:55.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Feb  9 00:17:55.856077 kubelet[1870]: I0209 00:17:55.856049    1870 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.12"
Feb  9 00:17:55.857457 kubelet[1870]: E0209 00:17:55.857376    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a0677", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605931639, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 856012037, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a0677" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.857683 kubelet[1870]: E0209 00:17:55.857561    1870 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.12"
Feb  9 00:17:55.858572 kubelet[1870]: E0209 00:17:55.858501    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a22fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605938939, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 856017937, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a22fb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:55.952050 kubelet[1870]: E0209 00:17:55.951955    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a310b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605942539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 856021037, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a310b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:56.197618 kubelet[1870]: E0209 00:17:56.197564    1870 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.200.8.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Feb  9 00:17:56.258914 kubelet[1870]: I0209 00:17:56.258874    1870 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.12"
Feb  9 00:17:56.260546 kubelet[1870]: E0209 00:17:56.260515    1870 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.12"
Feb  9 00:17:56.260705 kubelet[1870]: E0209 00:17:56.260501    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a0677", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605931639, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 56, 258825726, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a0677" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:56.352571 kubelet[1870]: E0209 00:17:56.352456    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a22fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605938939, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 56, 258840227, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a22fb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:56.421128 kubelet[1870]: W0209 00:17:56.421093    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 00:17:56.421128 kubelet[1870]: E0209 00:17:56.421128    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 00:17:56.451541 kubelet[1870]: W0209 00:17:56.451423    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 00:17:56.451541 kubelet[1870]: E0209 00:17:56.451458    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 00:17:56.546121 kubelet[1870]: E0209 00:17:56.545981    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:17:56.552203 kubelet[1870]: E0209 00:17:56.552108    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a310b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605942539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 56, 258845027, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a310b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:56.833364 kubelet[1870]: W0209 00:17:56.832826    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 00:17:56.833364 kubelet[1870]: E0209 00:17:56.832889    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 00:17:56.911356 kubelet[1870]: W0209 00:17:56.911277    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 00:17:56.911356 kubelet[1870]: E0209 00:17:56.911357    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 00:17:56.999011 kubelet[1870]: E0209 00:17:56.998962    1870 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.200.8.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Feb  9 00:17:57.061424 kubelet[1870]: I0209 00:17:57.061384    1870 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.12"
Feb  9 00:17:57.062615 kubelet[1870]: E0209 00:17:57.062586    1870 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.12"
Feb  9 00:17:57.062725 kubelet[1870]: E0209 00:17:57.062577    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a0677", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605931639, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 57, 61332216, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a0677" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:57.063562 kubelet[1870]: E0209 00:17:57.063498    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a22fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605938939, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 57, 61346316, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a22fb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:57.152365 kubelet[1870]: E0209 00:17:57.152266    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a310b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605942539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 57, 61351416, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a310b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:57.546746 kubelet[1870]: E0209 00:17:57.546623    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:17:58.547469 kubelet[1870]: E0209 00:17:58.547414    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:17:58.600713 kubelet[1870]: E0209 00:17:58.600670    1870 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.200.8.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Feb  9 00:17:58.664245 kubelet[1870]: I0209 00:17:58.664203    1870 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.12"
Feb  9 00:17:58.665752 kubelet[1870]: E0209 00:17:58.665720    1870 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.12"
Feb  9 00:17:58.665878 kubelet[1870]: E0209 00:17:58.665696    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a0677", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605931639, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 58, 664141146, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a0677" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:58.666958 kubelet[1870]: E0209 00:17:58.666882    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a22fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605938939, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 58, 664164246, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a22fb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:58.668189 kubelet[1870]: E0209 00:17:58.668019    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a310b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605942539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 17, 58, 664168646, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a310b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:17:59.438352 kubelet[1870]: W0209 00:17:59.438308    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 00:17:59.438352 kubelet[1870]: E0209 00:17:59.438350    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 00:17:59.461919 kubelet[1870]: W0209 00:17:59.461890    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 00:17:59.462077 kubelet[1870]: E0209 00:17:59.462063    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 00:17:59.497607 kubelet[1870]: W0209 00:17:59.497572    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 00:17:59.497607 kubelet[1870]: E0209 00:17:59.497610    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 00:17:59.548186 kubelet[1870]: E0209 00:17:59.548130    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:17:59.726425 kubelet[1870]: W0209 00:17:59.726291    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 00:17:59.726425 kubelet[1870]: E0209 00:17:59.726334    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 00:18:00.548615 kubelet[1870]: E0209 00:18:00.548557    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:01.549019 kubelet[1870]: E0209 00:18:01.548965    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:01.802895 kubelet[1870]: E0209 00:18:01.802774    1870 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.200.8.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Feb  9 00:18:01.867195 kubelet[1870]: I0209 00:18:01.867147    1870 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.12"
Feb  9 00:18:01.868562 kubelet[1870]: E0209 00:18:01.868522    1870 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.12"
Feb  9 00:18:01.868711 kubelet[1870]: E0209 00:18:01.868526    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a0677", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605931639, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 18, 1, 867098243, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a0677" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:18:01.869522 kubelet[1870]: E0209 00:18:01.869428    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a22fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605938939, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 18, 1, 867111443, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a22fb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:18:01.870330 kubelet[1870]: E0209 00:18:01.870264    1870 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12.17b209b3938a310b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.12", UID:"10.200.8.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.12"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 17, 55, 605942539, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 18, 1, 867116143, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.12.17b209b3938a310b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Feb  9 00:18:02.549611 kubelet[1870]: E0209 00:18:02.549552    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:03.550302 kubelet[1870]: E0209 00:18:03.550247    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:03.691610 kubelet[1870]: W0209 00:18:03.691534    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 00:18:03.691610 kubelet[1870]: E0209 00:18:03.691609    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Feb  9 00:18:04.294835 kubelet[1870]: W0209 00:18:04.294791    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 00:18:04.294835 kubelet[1870]: E0209 00:18:04.294833    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Feb  9 00:18:04.547942 kubelet[1870]: W0209 00:18:04.547829    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 00:18:04.547942 kubelet[1870]: E0209 00:18:04.547868    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Feb  9 00:18:04.551116 kubelet[1870]: E0209 00:18:04.551037    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:04.790470 kubelet[1870]: W0209 00:18:04.790427    1870 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 00:18:04.790470 kubelet[1870]: E0209 00:18:04.790467    1870 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Feb  9 00:18:05.538153 kubelet[1870]: I0209 00:18:05.538092    1870 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials"
Feb  9 00:18:05.551707 kubelet[1870]: E0209 00:18:05.551591    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:05.637214 kubelet[1870]: E0209 00:18:05.637176    1870 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.12\" not found"
Feb  9 00:18:05.945630 kubelet[1870]: E0209 00:18:05.945558    1870 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.12" not found
Feb  9 00:18:06.552458 kubelet[1870]: E0209 00:18:06.552410    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:06.994978 kubelet[1870]: E0209 00:18:06.994939    1870 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.12" not found
Feb  9 00:18:07.552974 kubelet[1870]: E0209 00:18:07.552881    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:08.207925 kubelet[1870]: E0209 00:18:08.207887    1870 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.12\" not found" node="10.200.8.12"
Feb  9 00:18:08.270390 kubelet[1870]: I0209 00:18:08.270356    1870 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.12"
Feb  9 00:18:08.395751 kubelet[1870]: I0209 00:18:08.395648    1870 kubelet_node_status.go:73] "Successfully registered node" node="10.200.8.12"
Feb  9 00:18:08.418220 kubelet[1870]: E0209 00:18:08.418180    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:08.519064 kubelet[1870]: E0209 00:18:08.518919    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:08.553707 sudo[1650]: pam_unix(sudo:session): session closed for user root
Feb  9 00:18:08.552000 audit[1650]: USER_END pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:18:08.555838 kubelet[1870]: E0209 00:18:08.555819    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:08.559508 kernel: kauditd_printk_skb: 276 callbacks suppressed
Feb  9 00:18:08.559592 kernel: audit: type=1106 audit(1707437888.552:570): pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:18:08.552000 audit[1650]: CRED_DISP pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:18:08.588897 kernel: audit: type=1104 audit(1707437888.552:571): pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 00:18:08.619574 kubelet[1870]: E0209 00:18:08.619537    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:08.653894 sshd[1647]: pam_unix(sshd:session): session closed for user core
Feb  9 00:18:08.653000 audit[1647]: USER_END pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:18:08.657140 systemd[1]: sshd@6-10.200.8.12:22-10.200.12.6:41438.service: Deactivated successfully.
Feb  9 00:18:08.657879 systemd[1]: session-9.scope: Deactivated successfully.
Feb  9 00:18:08.659272 systemd-logind[1301]: Session 9 logged out. Waiting for processes to exit.
Feb  9 00:18:08.660313 systemd-logind[1301]: Removed session 9.
Feb  9 00:18:08.653000 audit[1647]: CRED_DISP pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:18:08.690885 kernel: audit: type=1106 audit(1707437888.653:572): pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:18:08.690958 kernel: audit: type=1104 audit(1707437888.653:573): pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Feb  9 00:18:08.690984 kernel: audit: type=1131 audit(1707437888.655:574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.12:22-10.200.12.6:41438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:18:08.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.12:22-10.200.12.6:41438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 00:18:08.720331 kubelet[1870]: E0209 00:18:08.720294    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:08.821062 kubelet[1870]: E0209 00:18:08.820932    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:08.921886 kubelet[1870]: E0209 00:18:08.921833    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.022136 kubelet[1870]: E0209 00:18:09.022084    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.123192 kubelet[1870]: E0209 00:18:09.123061    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.223776 kubelet[1870]: E0209 00:18:09.223724    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.324533 kubelet[1870]: E0209 00:18:09.324467    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.425242 kubelet[1870]: E0209 00:18:09.425182    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.526190 kubelet[1870]: E0209 00:18:09.526137    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.557187 kubelet[1870]: E0209 00:18:09.557143    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:09.626400 kubelet[1870]: E0209 00:18:09.626338    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.727102 kubelet[1870]: E0209 00:18:09.726763    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.827498 kubelet[1870]: E0209 00:18:09.827438    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:09.928385 kubelet[1870]: E0209 00:18:09.928332    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.029266 kubelet[1870]: E0209 00:18:10.029127    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.129550 kubelet[1870]: E0209 00:18:10.129493    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.230277 kubelet[1870]: E0209 00:18:10.230226    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.331145 kubelet[1870]: E0209 00:18:10.331018    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.431840 kubelet[1870]: E0209 00:18:10.431785    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.532607 kubelet[1870]: E0209 00:18:10.532549    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.557502 kubelet[1870]: E0209 00:18:10.557444    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:10.633647 kubelet[1870]: E0209 00:18:10.633612    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.734466 kubelet[1870]: E0209 00:18:10.734417    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.835396 kubelet[1870]: E0209 00:18:10.835343    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:10.936222 kubelet[1870]: E0209 00:18:10.936088    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.037045 kubelet[1870]: E0209 00:18:11.036986    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.138142 kubelet[1870]: E0209 00:18:11.138085    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.239052 kubelet[1870]: E0209 00:18:11.238917    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.339757 kubelet[1870]: E0209 00:18:11.339702    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.440504 kubelet[1870]: E0209 00:18:11.440439    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.541397 kubelet[1870]: E0209 00:18:11.541277    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.557999 kubelet[1870]: E0209 00:18:11.557964    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:11.642292 kubelet[1870]: E0209 00:18:11.642237    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.743072 kubelet[1870]: E0209 00:18:11.743021    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.843954 kubelet[1870]: E0209 00:18:11.843825    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:11.944621 kubelet[1870]: E0209 00:18:11.944571    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.045647 kubelet[1870]: E0209 00:18:12.045544    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.146183 kubelet[1870]: E0209 00:18:12.146137    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.246772 kubelet[1870]: E0209 00:18:12.246723    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.347624 kubelet[1870]: E0209 00:18:12.347538    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.447993 kubelet[1870]: E0209 00:18:12.447863    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.549160 kubelet[1870]: E0209 00:18:12.549006    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.558848 kubelet[1870]: E0209 00:18:12.558771    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:12.649326 kubelet[1870]: E0209 00:18:12.649280    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.750083 kubelet[1870]: E0209 00:18:12.749960    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.850962 kubelet[1870]: E0209 00:18:12.850911    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:12.951934 kubelet[1870]: E0209 00:18:12.951851    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.052970 kubelet[1870]: E0209 00:18:13.052845    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.153624 kubelet[1870]: E0209 00:18:13.153575    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.254274 kubelet[1870]: E0209 00:18:13.254221    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.355055 kubelet[1870]: E0209 00:18:13.354948    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.455702 kubelet[1870]: E0209 00:18:13.455626    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.556582 kubelet[1870]: E0209 00:18:13.556523    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.559751 kubelet[1870]: E0209 00:18:13.559725    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:13.656711 kubelet[1870]: E0209 00:18:13.656660    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.757480 kubelet[1870]: E0209 00:18:13.757429    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.858757 kubelet[1870]: E0209 00:18:13.858624    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:13.959080 kubelet[1870]: E0209 00:18:13.958868    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:14.059967 kubelet[1870]: E0209 00:18:14.059915    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:14.160666 kubelet[1870]: E0209 00:18:14.160610    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:14.261414 kubelet[1870]: E0209 00:18:14.261277    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:14.362283 kubelet[1870]: E0209 00:18:14.362232    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:14.463043 kubelet[1870]: E0209 00:18:14.462987    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:14.560399 kubelet[1870]: E0209 00:18:14.560269    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:14.563518 kubelet[1870]: E0209 00:18:14.563434    1870 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.12\" not found"
Feb  9 00:18:14.665306 kubelet[1870]: I0209 00:18:14.665147    1870 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24"
Feb  9 00:18:14.665604 env[1312]: time="2024-02-09T00:18:14.665536315Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Feb  9 00:18:14.666261 kubelet[1870]: I0209 00:18:14.666233    1870 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24"
Feb  9 00:18:15.545549 kubelet[1870]: E0209 00:18:15.545478    1870 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:15.559842 kubelet[1870]: I0209 00:18:15.559796    1870 apiserver.go:52] "Watching apiserver"
Feb  9 00:18:15.560549 kubelet[1870]: E0209 00:18:15.560515    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:15.563713 kubelet[1870]: I0209 00:18:15.563684    1870 topology_manager.go:210] "Topology Admit Handler"
Feb  9 00:18:15.563833 kubelet[1870]: I0209 00:18:15.563822    1870 topology_manager.go:210] "Topology Admit Handler"
Feb  9 00:18:15.563909 kubelet[1870]: I0209 00:18:15.563898    1870 topology_manager.go:210] "Topology Admit Handler"
Feb  9 00:18:15.564867 kubelet[1870]: E0209 00:18:15.564165    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:15.570103 systemd[1]: Created slice kubepods-besteffort-podf457f936_460e_4f29_9bd6_557db7b47a5c.slice.
Feb  9 00:18:15.586954 systemd[1]: Created slice kubepods-besteffort-pod202c866c_a180_4bea_9682_cc890b834d0c.slice.
Feb  9 00:18:15.652156 kubelet[1870]: I0209 00:18:15.652124    1870 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Feb  9 00:18:15.673954 kubelet[1870]: I0209 00:18:15.673921    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/202c866c-a180-4bea-9682-cc890b834d0c-xtables-lock\") pod \"kube-proxy-j5kff\" (UID: \"202c866c-a180-4bea-9682-cc890b834d0c\") " pod="kube-system/kube-proxy-j5kff"
Feb  9 00:18:15.674097 kubelet[1870]: I0209 00:18:15.673980    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/155d0c6d-0e58-4536-8ce2-58eb7a4d42f7-socket-dir\") pod \"csi-node-driver-76n98\" (UID: \"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7\") " pod="calico-system/csi-node-driver-76n98"
Feb  9 00:18:15.674097 kubelet[1870]: I0209 00:18:15.674021    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/155d0c6d-0e58-4536-8ce2-58eb7a4d42f7-registration-dir\") pod \"csi-node-driver-76n98\" (UID: \"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7\") " pod="calico-system/csi-node-driver-76n98"
Feb  9 00:18:15.674097 kubelet[1870]: I0209 00:18:15.674055    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-lib-modules\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674097 kubelet[1870]: I0209 00:18:15.674090    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-var-run-calico\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674320 kubelet[1870]: I0209 00:18:15.674127    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d7zwm\" (UniqueName: \"kubernetes.io/projected/202c866c-a180-4bea-9682-cc890b834d0c-kube-api-access-d7zwm\") pod \"kube-proxy-j5kff\" (UID: \"202c866c-a180-4bea-9682-cc890b834d0c\") " pod="kube-system/kube-proxy-j5kff"
Feb  9 00:18:15.674320 kubelet[1870]: I0209 00:18:15.674167    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/155d0c6d-0e58-4536-8ce2-58eb7a4d42f7-varrun\") pod \"csi-node-driver-76n98\" (UID: \"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7\") " pod="calico-system/csi-node-driver-76n98"
Feb  9 00:18:15.674320 kubelet[1870]: I0209 00:18:15.674207    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-policysync\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674320 kubelet[1870]: I0209 00:18:15.674248    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-var-lib-calico\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674320 kubelet[1870]: I0209 00:18:15.674284    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/202c866c-a180-4bea-9682-cc890b834d0c-kube-proxy\") pod \"kube-proxy-j5kff\" (UID: \"202c866c-a180-4bea-9682-cc890b834d0c\") " pod="kube-system/kube-proxy-j5kff"
Feb  9 00:18:15.674620 kubelet[1870]: I0209 00:18:15.674321    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/202c866c-a180-4bea-9682-cc890b834d0c-lib-modules\") pod \"kube-proxy-j5kff\" (UID: \"202c866c-a180-4bea-9682-cc890b834d0c\") " pod="kube-system/kube-proxy-j5kff"
Feb  9 00:18:15.674620 kubelet[1870]: I0209 00:18:15.674359    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sbb7s\" (UniqueName: \"kubernetes.io/projected/155d0c6d-0e58-4536-8ce2-58eb7a4d42f7-kube-api-access-sbb7s\") pod \"csi-node-driver-76n98\" (UID: \"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7\") " pod="calico-system/csi-node-driver-76n98"
Feb  9 00:18:15.674620 kubelet[1870]: I0209 00:18:15.674395    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f457f936-460e-4f29-9bd6-557db7b47a5c-tigera-ca-bundle\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674620 kubelet[1870]: I0209 00:18:15.674432    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-cni-bin-dir\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674620 kubelet[1870]: I0209 00:18:15.674467    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-cni-net-dir\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674882 kubelet[1870]: I0209 00:18:15.674523    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-cni-log-dir\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674882 kubelet[1870]: I0209 00:18:15.674566    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-flexvol-driver-host\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674882 kubelet[1870]: I0209 00:18:15.674606    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fl7j5\" (UniqueName: \"kubernetes.io/projected/f457f936-460e-4f29-9bd6-557db7b47a5c-kube-api-access-fl7j5\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.674882 kubelet[1870]: I0209 00:18:15.674642    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/155d0c6d-0e58-4536-8ce2-58eb7a4d42f7-kubelet-dir\") pod \"csi-node-driver-76n98\" (UID: \"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7\") " pod="calico-system/csi-node-driver-76n98"
Feb  9 00:18:15.674882 kubelet[1870]: I0209 00:18:15.674679    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f457f936-460e-4f29-9bd6-557db7b47a5c-xtables-lock\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.675173 kubelet[1870]: I0209 00:18:15.674715    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f457f936-460e-4f29-9bd6-557db7b47a5c-node-certs\") pod \"calico-node-5frls\" (UID: \"f457f936-460e-4f29-9bd6-557db7b47a5c\") " pod="calico-system/calico-node-5frls"
Feb  9 00:18:15.675173 kubelet[1870]: I0209 00:18:15.674738    1870 reconciler.go:41] "Reconciler: start to sync state"
Feb  9 00:18:15.777523 kubelet[1870]: E0209 00:18:15.777468    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.777778 kubelet[1870]: W0209 00:18:15.777756    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.777913 kubelet[1870]: E0209 00:18:15.777894    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.778266 kubelet[1870]: E0209 00:18:15.778246    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.778391 kubelet[1870]: W0209 00:18:15.778373    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.778519 kubelet[1870]: E0209 00:18:15.778504    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.778863 kubelet[1870]: E0209 00:18:15.778831    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.778982 kubelet[1870]: W0209 00:18:15.778965    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.779088 kubelet[1870]: E0209 00:18:15.779075    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.779416 kubelet[1870]: E0209 00:18:15.779383    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.779549 kubelet[1870]: W0209 00:18:15.779534    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.779663 kubelet[1870]: E0209 00:18:15.779648    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.779989 kubelet[1870]: E0209 00:18:15.779971    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.780109 kubelet[1870]: W0209 00:18:15.780093    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.780221 kubelet[1870]: E0209 00:18:15.780197    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.780552 kubelet[1870]: E0209 00:18:15.780535    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.780680 kubelet[1870]: W0209 00:18:15.780667    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.780907 kubelet[1870]: E0209 00:18:15.780896    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.780987 kubelet[1870]: W0209 00:18:15.780977    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.781208 kubelet[1870]: E0209 00:18:15.781196    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.781289 kubelet[1870]: W0209 00:18:15.781277    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.781558 kubelet[1870]: E0209 00:18:15.781546    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.781652 kubelet[1870]: W0209 00:18:15.781640    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.781888 kubelet[1870]: E0209 00:18:15.781876    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.781972 kubelet[1870]: W0209 00:18:15.781960    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.782047 kubelet[1870]: E0209 00:18:15.782038    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.785733 kubelet[1870]: E0209 00:18:15.785718    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.785821 kubelet[1870]: W0209 00:18:15.785809    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.785911 kubelet[1870]: E0209 00:18:15.785902    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.786165 kubelet[1870]: E0209 00:18:15.786154    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.786251 kubelet[1870]: W0209 00:18:15.786239    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.786320 kubelet[1870]: E0209 00:18:15.786312    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.786449 kubelet[1870]: E0209 00:18:15.786437    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.786798 kubelet[1870]: E0209 00:18:15.786785    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.786893 kubelet[1870]: W0209 00:18:15.786880    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.786969 kubelet[1870]: E0209 00:18:15.786960    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.787121 kubelet[1870]: E0209 00:18:15.787110    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.787250 kubelet[1870]: E0209 00:18:15.787236    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.787887 kubelet[1870]: E0209 00:18:15.787336    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.788026 kubelet[1870]: E0209 00:18:15.787864    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.788292 kubelet[1870]: W0209 00:18:15.788277    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.788406 kubelet[1870]: E0209 00:18:15.788395    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.788657 kubelet[1870]: E0209 00:18:15.788640    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.788657 kubelet[1870]: W0209 00:18:15.788654    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.788808 kubelet[1870]: E0209 00:18:15.788674    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.788899 kubelet[1870]: E0209 00:18:15.788882    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.788899 kubelet[1870]: W0209 00:18:15.788895    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.789006 kubelet[1870]: E0209 00:18:15.788914    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.789452 kubelet[1870]: E0209 00:18:15.789435    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.789452 kubelet[1870]: W0209 00:18:15.789448    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.789639 kubelet[1870]: E0209 00:18:15.789625    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.789728 kubelet[1870]: E0209 00:18:15.789677    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.789728 kubelet[1870]: W0209 00:18:15.789726    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.789848 kubelet[1870]: E0209 00:18:15.789742    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.789972 kubelet[1870]: E0209 00:18:15.789958    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.789972 kubelet[1870]: W0209 00:18:15.789970    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.790053 kubelet[1870]: E0209 00:18:15.789985    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.877970 kubelet[1870]: E0209 00:18:15.877365    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.877970 kubelet[1870]: W0209 00:18:15.877383    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.877970 kubelet[1870]: E0209 00:18:15.877405    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.877970 kubelet[1870]: E0209 00:18:15.877651    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.877970 kubelet[1870]: W0209 00:18:15.877662    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.877970 kubelet[1870]: E0209 00:18:15.877686    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.877970 kubelet[1870]: E0209 00:18:15.877877    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.877970 kubelet[1870]: W0209 00:18:15.877887    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.877970 kubelet[1870]: E0209 00:18:15.877901    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.978587 kubelet[1870]: E0209 00:18:15.978548    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.978587 kubelet[1870]: W0209 00:18:15.978570    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.978587 kubelet[1870]: E0209 00:18:15.978594    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.978896 kubelet[1870]: E0209 00:18:15.978839    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.978896 kubelet[1870]: W0209 00:18:15.978852    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.978896 kubelet[1870]: E0209 00:18:15.978871    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.979107 kubelet[1870]: E0209 00:18:15.979086    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.979107 kubelet[1870]: W0209 00:18:15.979105    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.979232 kubelet[1870]: E0209 00:18:15.979123    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:15.988934 kubelet[1870]: E0209 00:18:15.988914    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:15.988934 kubelet[1870]: W0209 00:18:15.988928    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:15.989062 kubelet[1870]: E0209 00:18:15.988945    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.079878 kubelet[1870]: E0209 00:18:16.079841    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:16.079878 kubelet[1870]: W0209 00:18:16.079867    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:16.080162 kubelet[1870]: E0209 00:18:16.079894    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.080236 kubelet[1870]: E0209 00:18:16.080166    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:16.080236 kubelet[1870]: W0209 00:18:16.080180    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:16.080236 kubelet[1870]: E0209 00:18:16.080200    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.181072 kubelet[1870]: E0209 00:18:16.181040    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:16.181072 kubelet[1870]: W0209 00:18:16.181062    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:16.181343 kubelet[1870]: E0209 00:18:16.181086    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.181343 kubelet[1870]: E0209 00:18:16.181339    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:16.181456 kubelet[1870]: W0209 00:18:16.181355    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:16.181456 kubelet[1870]: E0209 00:18:16.181375    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.190979 env[1312]: time="2024-02-09T00:18:16.190507274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5frls,Uid:f457f936-460e-4f29-9bd6-557db7b47a5c,Namespace:calico-system,Attempt:0,}"
Feb  9 00:18:16.195289 kubelet[1870]: E0209 00:18:16.195270    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:16.195289 kubelet[1870]: W0209 00:18:16.195284    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:16.195414 kubelet[1870]: E0209 00:18:16.195303    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.281918 kubelet[1870]: E0209 00:18:16.281886    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:16.281918 kubelet[1870]: W0209 00:18:16.281908    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:16.282109 kubelet[1870]: E0209 00:18:16.281938    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.383193 kubelet[1870]: E0209 00:18:16.383156    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:16.383193 kubelet[1870]: W0209 00:18:16.383185    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:16.383379 kubelet[1870]: E0209 00:18:16.383207    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.389392 kubelet[1870]: E0209 00:18:16.389369    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:16.389392 kubelet[1870]: W0209 00:18:16.389385    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:16.389543 kubelet[1870]: E0209 00:18:16.389404    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:16.491063 env[1312]: time="2024-02-09T00:18:16.490938760Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j5kff,Uid:202c866c-a180-4bea-9682-cc890b834d0c,Namespace:kube-system,Attempt:0,}"
Feb  9 00:18:16.561299 kubelet[1870]: E0209 00:18:16.561261    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:16.833114 kubelet[1870]: E0209 00:18:16.832765    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:17.544204 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1873972564.mount: Deactivated successfully.
Feb  9 00:18:17.561383 kubelet[1870]: E0209 00:18:17.561350    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:17.571362 env[1312]: time="2024-02-09T00:18:17.571315999Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:17.573560 env[1312]: time="2024-02-09T00:18:17.573526737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:17.582315 env[1312]: time="2024-02-09T00:18:17.582280687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:17.584814 env[1312]: time="2024-02-09T00:18:17.584781530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:17.587825 env[1312]: time="2024-02-09T00:18:17.587792382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:17.589703 env[1312]: time="2024-02-09T00:18:17.589673414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:17.593359 env[1312]: time="2024-02-09T00:18:17.593323876Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:17.597183 env[1312]: time="2024-02-09T00:18:17.597149742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:17.674743 env[1312]: time="2024-02-09T00:18:17.673225244Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 00:18:17.674743 env[1312]: time="2024-02-09T00:18:17.673250245Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 00:18:17.674743 env[1312]: time="2024-02-09T00:18:17.673259145Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 00:18:17.674743 env[1312]: time="2024-02-09T00:18:17.673374047Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31 pid=1996 runtime=io.containerd.runc.v2
Feb  9 00:18:17.675956 env[1312]: time="2024-02-09T00:18:17.672399530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 00:18:17.675956 env[1312]: time="2024-02-09T00:18:17.672455031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 00:18:17.675956 env[1312]: time="2024-02-09T00:18:17.672471931Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 00:18:17.675956 env[1312]: time="2024-02-09T00:18:17.672659935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2396d8d8226a894eb1eaa94ac008f1f01dca06ee2030bd63acd4ed33ad827ea6 pid=1993 runtime=io.containerd.runc.v2
Feb  9 00:18:17.694946 systemd[1]: Started cri-containerd-2396d8d8226a894eb1eaa94ac008f1f01dca06ee2030bd63acd4ed33ad827ea6.scope.
Feb  9 00:18:17.699766 systemd[1]: Started cri-containerd-c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31.scope.
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733513 kernel: audit: type=1400 audit(1707437897.718:575): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.748887 kernel: audit: type=1400 audit(1707437897.718:576): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.748956 kernel: audit: type=1400 audit(1707437897.718:577): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.773365 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Feb  9 00:18:17.773440 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64
Feb  9 00:18:17.773462 kernel: audit: backlog limit exceeded
Feb  9 00:18:17.777898 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Feb  9 00:18:17.795209 kernel: audit: type=1400 audit(1707437897.718:578): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.795316 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.813918 kernel: audit: type=1400 audit(1707437897.718:579): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.815080 env[1312]: time="2024-02-09T00:18:17.815036372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j5kff,Uid:202c866c-a180-4bea-9682-cc890b834d0c,Namespace:kube-system,Attempt:0,} returns sandbox id \"2396d8d8226a894eb1eaa94ac008f1f01dca06ee2030bd63acd4ed33ad827ea6\""
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.732000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.732000 audit: BPF prog-id=62 op=LOAD
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1993 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:17.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393664386438323236613839346562316561613934616330303866
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1993 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:17.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393664386438323236613839346562316561613934616330303866
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.733000 audit: BPF prog-id=63 op=LOAD
Feb  9 00:18:17.733000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000302c10 items=0 ppid=1993 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:17.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393664386438323236613839346562316561613934616330303866
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit: BPF prog-id=64 op=LOAD
Feb  9 00:18:17.760000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000302c58 items=0 ppid=1993 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:17.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393664386438323236613839346562316561613934616330303866
Feb  9 00:18:17.760000 audit: BPF prog-id=64 op=UNLOAD
Feb  9 00:18:17.760000 audit: BPF prog-id=63 op=UNLOAD
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { perfmon } for  pid=2015 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit[2015]: AVC avc:  denied  { bpf } for  pid=2015 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.760000 audit: BPF prog-id=65 op=LOAD
Feb  9 00:18:17.760000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000303068 items=0 ppid=1993 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:17.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393664386438323236613839346562316561613934616330303866
Feb  9 00:18:17.761000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.761000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.761000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.761000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.761000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.761000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.761000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:17.813000 audit: BPF prog-id=66 op=LOAD
Feb  9 00:18:17.820224 env[1312]: time="2024-02-09T00:18:17.820191361Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\""
Feb  9 00:18:17.833582 env[1312]: time="2024-02-09T00:18:17.833545989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5frls,Uid:f457f936-460e-4f29-9bd6-557db7b47a5c,Namespace:calico-system,Attempt:0,} returns sandbox id \"c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31\""
Feb  9 00:18:18.561466 kubelet[1870]: E0209 00:18:18.561425    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:18.832875 kubelet[1870]: E0209 00:18:18.832750    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:18.985377 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount204192278.mount: Deactivated successfully.
Feb  9 00:18:19.473740 env[1312]: time="2024-02-09T00:18:19.473695089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:19.478019 env[1312]: time="2024-02-09T00:18:19.477981858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:19.481451 env[1312]: time="2024-02-09T00:18:19.481329313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:19.486524 env[1312]: time="2024-02-09T00:18:19.484649766Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:19.486524 env[1312]: time="2024-02-09T00:18:19.484931971Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\""
Feb  9 00:18:19.487390 env[1312]: time="2024-02-09T00:18:19.487360410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\""
Feb  9 00:18:19.488407 env[1312]: time="2024-02-09T00:18:19.488374227Z" level=info msg="CreateContainer within sandbox \"2396d8d8226a894eb1eaa94ac008f1f01dca06ee2030bd63acd4ed33ad827ea6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Feb  9 00:18:19.514910 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3957774970.mount: Deactivated successfully.
Feb  9 00:18:19.532365 env[1312]: time="2024-02-09T00:18:19.532317740Z" level=info msg="CreateContainer within sandbox \"2396d8d8226a894eb1eaa94ac008f1f01dca06ee2030bd63acd4ed33ad827ea6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"593b3921098e8cef510c2a1f51e527e2880edb384398cd301b9ae89be07987f6\""
Feb  9 00:18:19.534080 env[1312]: time="2024-02-09T00:18:19.534047768Z" level=info msg="StartContainer for \"593b3921098e8cef510c2a1f51e527e2880edb384398cd301b9ae89be07987f6\""
Feb  9 00:18:19.560007 systemd[1]: Started cri-containerd-593b3921098e8cef510c2a1f51e527e2880edb384398cd301b9ae89be07987f6.scope.
Feb  9 00:18:19.567350 kubelet[1870]: E0209 00:18:19.564815    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:19.571343 systemd[1]: run-containerd-runc-k8s.io-593b3921098e8cef510c2a1f51e527e2880edb384398cd301b9ae89be07987f6-runc.R3ukXG.mount: Deactivated successfully.
Feb  9 00:18:19.588000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.588000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1993 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336233393231303938653863656635313063326131663531653532
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit: BPF prog-id=70 op=LOAD
Feb  9 00:18:19.589000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003945a0 items=0 ppid=1993 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336233393231303938653863656635313063326131663531653532
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.589000 audit: BPF prog-id=71 op=LOAD
Feb  9 00:18:19.589000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003945e8 items=0 ppid=1993 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336233393231303938653863656635313063326131663531653532
Feb  9 00:18:19.590000 audit: BPF prog-id=71 op=UNLOAD
Feb  9 00:18:19.590000 audit: BPF prog-id=70 op=UNLOAD
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { perfmon } for  pid=2070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit[2070]: AVC avc:  denied  { bpf } for  pid=2070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:19.590000 audit: BPF prog-id=72 op=LOAD
Feb  9 00:18:19.590000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000394678 items=0 ppid=1993 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336233393231303938653863656635313063326131663531653532
Feb  9 00:18:19.609634 env[1312]: time="2024-02-09T00:18:19.609602293Z" level=info msg="StartContainer for \"593b3921098e8cef510c2a1f51e527e2880edb384398cd301b9ae89be07987f6\" returns successfully"
Feb  9 00:18:19.645000 audit[2118]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.645000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff376793c0 a2=0 a3=7fff376793ac items=0 ppid=2080 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Feb  9 00:18:19.647000 audit[2119]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.647000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0792f240 a2=0 a3=7ffd0792f22c items=0 ppid=2080 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Feb  9 00:18:19.649000 audit[2120]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.649000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3b42d320 a2=0 a3=7ffc3b42d30c items=0 ppid=2080 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.649000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Feb  9 00:18:19.652000 audit[2121]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.652000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd0c0c540 a2=0 a3=7ffcd0c0c52c items=0 ppid=2080 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Feb  9 00:18:19.653000 audit[2122]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.653000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0d375de0 a2=0 a3=7ffd0d375dcc items=0 ppid=2080 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Feb  9 00:18:19.655000 audit[2124]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.655000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc802ea410 a2=0 a3=7ffc802ea3fc items=0 ppid=2080 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Feb  9 00:18:19.749000 audit[2125]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.749000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff3fe9a370 a2=0 a3=7fff3fe9a35c items=0 ppid=2080 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Feb  9 00:18:19.753000 audit[2127]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.753000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffccd3a2a90 a2=0 a3=7ffccd3a2a7c items=0 ppid=2080 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Feb  9 00:18:19.757000 audit[2130]: NETFILTER_CFG table=filter:46 family=2 entries=2 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.757000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe45f68a30 a2=0 a3=7ffe45f68a1c items=0 ppid=2080 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Feb  9 00:18:19.758000 audit[2131]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.758000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5ebffa50 a2=0 a3=7ffd5ebffa3c items=0 ppid=2080 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Feb  9 00:18:19.760000 audit[2133]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.760000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcdf571760 a2=0 a3=7ffcdf57174c items=0 ppid=2080 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Feb  9 00:18:19.761000 audit[2134]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.761000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4d3b42e0 a2=0 a3=7ffd4d3b42cc items=0 ppid=2080 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Feb  9 00:18:19.764000 audit[2136]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.764000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffddcac1380 a2=0 a3=7ffddcac136c items=0 ppid=2080 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Feb  9 00:18:19.767000 audit[2139]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.767000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb6e00250 a2=0 a3=7ffeb6e0023c items=0 ppid=2080 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Feb  9 00:18:19.768000 audit[2140]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.768000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0429e6d0 a2=0 a3=7ffd0429e6bc items=0 ppid=2080 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Feb  9 00:18:19.771000 audit[2142]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.771000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5854c370 a2=0 a3=7ffe5854c35c items=0 ppid=2080 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Feb  9 00:18:19.772000 audit[2143]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.772000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd00b78520 a2=0 a3=7ffd00b7850c items=0 ppid=2080 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Feb  9 00:18:19.774000 audit[2145]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.774000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb173a4f0 a2=0 a3=7ffeb173a4dc items=0 ppid=2080 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 00:18:19.778000 audit[2148]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.778000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfa9361d0 a2=0 a3=7ffdfa9361bc items=0 ppid=2080 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 00:18:19.781000 audit[2151]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.781000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd68d9c0b0 a2=0 a3=7ffd68d9c09c items=0 ppid=2080 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Feb  9 00:18:19.782000 audit[2152]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.782000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffc6a09a30 a2=0 a3=7fffc6a09a1c items=0 ppid=2080 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Feb  9 00:18:19.786000 audit[2154]: NETFILTER_CFG table=nat:59 family=2 entries=2 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.786000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc181e0ca0 a2=0 a3=7ffc181e0c8c items=0 ppid=2080 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 00:18:19.789000 audit[2157]: NETFILTER_CFG table=nat:60 family=2 entries=2 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 00:18:19.789000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe67a63610 a2=0 a3=7ffe67a635fc items=0 ppid=2080 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 00:18:19.794000 audit[2161]: NETFILTER_CFG table=filter:61 family=2 entries=3 op=nft_register_rule pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:18:19.794000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe18f01ad0 a2=0 a3=7ffe18f01abc items=0 ppid=2080 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:18:19.878000 audit[2161]: NETFILTER_CFG table=nat:62 family=2 entries=68 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:18:19.878000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe18f01ad0 a2=0 a3=7ffe18f01abc items=0 ppid=2080 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:18:19.882105 kubelet[1870]: I0209 00:18:19.882074    1870 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-j5kff" podStartSLOduration=-9.223372024972733e+09 pod.CreationTimestamp="2024-02-09 00:18:08 +0000 UTC" firstStartedPulling="2024-02-09 00:18:17.819313746 +0000 UTC m=+22.776977133" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:18:19.881372601 +0000 UTC m=+24.839035988" watchObservedRunningTime="2024-02-09 00:18:19.882043112 +0000 UTC m=+24.839706499"
Feb  9 00:18:19.894393 kubelet[1870]: E0209 00:18:19.894370    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.894393 kubelet[1870]: W0209 00:18:19.894386    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.894631 kubelet[1870]: E0209 00:18:19.894406    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.894631 kubelet[1870]: E0209 00:18:19.894625    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.894726 kubelet[1870]: W0209 00:18:19.894639    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.894726 kubelet[1870]: E0209 00:18:19.894654    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.894836 kubelet[1870]: E0209 00:18:19.894818    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.894836 kubelet[1870]: W0209 00:18:19.894831    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.894947 kubelet[1870]: E0209 00:18:19.894848    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.895069 kubelet[1870]: E0209 00:18:19.895053    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.895069 kubelet[1870]: W0209 00:18:19.895066    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.895193 kubelet[1870]: E0209 00:18:19.895081    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.895268 kubelet[1870]: E0209 00:18:19.895251    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.895268 kubelet[1870]: W0209 00:18:19.895266    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.895387 kubelet[1870]: E0209 00:18:19.895282    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.895467 kubelet[1870]: E0209 00:18:19.895450    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.895467 kubelet[1870]: W0209 00:18:19.895462    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.895591 kubelet[1870]: E0209 00:18:19.895477    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.895711 kubelet[1870]: E0209 00:18:19.895695    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.895711 kubelet[1870]: W0209 00:18:19.895708    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.895832 kubelet[1870]: E0209 00:18:19.895723    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.895945 kubelet[1870]: E0209 00:18:19.895930    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.895945 kubelet[1870]: W0209 00:18:19.895943    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.896071 kubelet[1870]: E0209 00:18:19.895958    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.896148 kubelet[1870]: E0209 00:18:19.896131    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.896148 kubelet[1870]: W0209 00:18:19.896145    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.896242 kubelet[1870]: E0209 00:18:19.896161    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.896415 kubelet[1870]: E0209 00:18:19.896399    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.896415 kubelet[1870]: W0209 00:18:19.896412    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.896584 kubelet[1870]: E0209 00:18:19.896427    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.896638 kubelet[1870]: E0209 00:18:19.896624    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.896638 kubelet[1870]: W0209 00:18:19.896633    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.896719 kubelet[1870]: E0209 00:18:19.896648    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.896874 kubelet[1870]: E0209 00:18:19.896858    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.896874 kubelet[1870]: W0209 00:18:19.896870    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.896997 kubelet[1870]: E0209 00:18:19.896886    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.897136 kubelet[1870]: E0209 00:18:19.897072    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.897136 kubelet[1870]: W0209 00:18:19.897081    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.897136 kubelet[1870]: E0209 00:18:19.897095    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.897366 kubelet[1870]: E0209 00:18:19.897352    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.897366 kubelet[1870]: W0209 00:18:19.897363    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.897509 kubelet[1870]: E0209 00:18:19.897378    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.897592 kubelet[1870]: E0209 00:18:19.897576    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.897592 kubelet[1870]: W0209 00:18:19.897590    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.897697 kubelet[1870]: E0209 00:18:19.897605    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.897846 kubelet[1870]: E0209 00:18:19.897830    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.897846 kubelet[1870]: W0209 00:18:19.897843    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.897945 kubelet[1870]: E0209 00:18:19.897857    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.914204 kubelet[1870]: E0209 00:18:19.914179    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.914308 kubelet[1870]: W0209 00:18:19.914243    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.914308 kubelet[1870]: E0209 00:18:19.914269    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.914000 audit[2186]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.914000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffecaf9140 a2=0 a3=7fffecaf912c items=0 ppid=2080 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Feb  9 00:18:19.917614 kubelet[1870]: E0209 00:18:19.914576    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.917614 kubelet[1870]: W0209 00:18:19.914592    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.917614 kubelet[1870]: E0209 00:18:19.914612    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.917614 kubelet[1870]: E0209 00:18:19.914841    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.917614 kubelet[1870]: W0209 00:18:19.914852    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.917614 kubelet[1870]: E0209 00:18:19.914871    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.917614 kubelet[1870]: E0209 00:18:19.915073    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.917614 kubelet[1870]: W0209 00:18:19.915082    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.917614 kubelet[1870]: E0209 00:18:19.915100    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.917614 kubelet[1870]: E0209 00:18:19.915287    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.918037 kubelet[1870]: W0209 00:18:19.915297    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.918037 kubelet[1870]: E0209 00:18:19.915316    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.918037 kubelet[1870]: E0209 00:18:19.915537    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.918037 kubelet[1870]: W0209 00:18:19.915548    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.918037 kubelet[1870]: E0209 00:18:19.915566    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.918037 kubelet[1870]: E0209 00:18:19.915966    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.918037 kubelet[1870]: W0209 00:18:19.915978    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.918037 kubelet[1870]: E0209 00:18:19.916054    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.918037 kubelet[1870]: E0209 00:18:19.916198    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.918037 kubelet[1870]: W0209 00:18:19.916208    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.918447 kubelet[1870]: E0209 00:18:19.916252    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.918447 kubelet[1870]: E0209 00:18:19.916445    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.918447 kubelet[1870]: W0209 00:18:19.916454    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.918447 kubelet[1870]: E0209 00:18:19.916469    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.918447 kubelet[1870]: E0209 00:18:19.916654    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.918447 kubelet[1870]: W0209 00:18:19.916664    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.918447 kubelet[1870]: E0209 00:18:19.916681    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.918447 kubelet[1870]: E0209 00:18:19.916873    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.918447 kubelet[1870]: W0209 00:18:19.916882    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.918447 kubelet[1870]: E0209 00:18:19.916896    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.918878 kubelet[1870]: E0209 00:18:19.917221    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:19.918878 kubelet[1870]: W0209 00:18:19.917232    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:19.918878 kubelet[1870]: E0209 00:18:19.917247    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:19.917000 audit[2198]: NETFILTER_CFG table=filter:64 family=10 entries=2 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.917000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc492bb9a0 a2=0 a3=7ffc492bb98c items=0 ppid=2080 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.917000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Feb  9 00:18:19.921000 audit[2201]: NETFILTER_CFG table=filter:65 family=10 entries=2 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.921000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd0fa18520 a2=0 a3=7ffd0fa1850c items=0 ppid=2080 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Feb  9 00:18:19.922000 audit[2202]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.922000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe661af5f0 a2=0 a3=7ffe661af5dc items=0 ppid=2080 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Feb  9 00:18:19.924000 audit[2204]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.924000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefa600070 a2=0 a3=7ffefa60005c items=0 ppid=2080 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Feb  9 00:18:19.926000 audit[2205]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.926000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc5de3760 a2=0 a3=7ffcc5de374c items=0 ppid=2080 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Feb  9 00:18:19.928000 audit[2207]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.928000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc59e6e3c0 a2=0 a3=7ffc59e6e3ac items=0 ppid=2080 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.928000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Feb  9 00:18:19.931000 audit[2210]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.931000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc2c2722c0 a2=0 a3=7ffc2c2722ac items=0 ppid=2080 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.931000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Feb  9 00:18:19.932000 audit[2211]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.932000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc171e6080 a2=0 a3=7ffc171e606c items=0 ppid=2080 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.932000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Feb  9 00:18:19.935000 audit[2213]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.935000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc101a2640 a2=0 a3=7ffc101a262c items=0 ppid=2080 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Feb  9 00:18:19.936000 audit[2214]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.936000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c2ebb40 a2=0 a3=7ffd9c2ebb2c items=0 ppid=2080 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Feb  9 00:18:19.938000 audit[2216]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.938000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdfe242f0 a2=0 a3=7fffdfe242dc items=0 ppid=2080 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Feb  9 00:18:19.942000 audit[2219]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.942000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea3327540 a2=0 a3=7ffea332752c items=0 ppid=2080 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Feb  9 00:18:19.946000 audit[2222]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.946000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd49441db0 a2=0 a3=7ffd49441d9c items=0 ppid=2080 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.946000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Feb  9 00:18:19.947000 audit[2223]: NETFILTER_CFG table=nat:77 family=10 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.947000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf31fc600 a2=0 a3=7ffdf31fc5ec items=0 ppid=2080 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.947000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Feb  9 00:18:19.949000 audit[2225]: NETFILTER_CFG table=nat:78 family=10 entries=2 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.949000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffedb0713d0 a2=0 a3=7ffedb0713bc items=0 ppid=2080 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 00:18:19.952000 audit[2228]: NETFILTER_CFG table=nat:79 family=10 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 00:18:19.952000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd5f6a0a30 a2=0 a3=7ffd5f6a0a1c items=0 ppid=2080 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Feb  9 00:18:19.957000 audit[2232]: NETFILTER_CFG table=filter:80 family=10 entries=3 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Feb  9 00:18:19.957000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc43fbc5c0 a2=0 a3=7ffc43fbc5ac items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.957000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:18:19.958000 audit[2232]: NETFILTER_CFG table=nat:81 family=10 entries=10 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Feb  9 00:18:19.958000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc43fbc5c0 a2=0 a3=7ffc43fbc5ac items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:19.958000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:18:20.565599 kubelet[1870]: E0209 00:18:20.565555    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:20.832624 kubelet[1870]: E0209 00:18:20.832448    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:20.905308 kubelet[1870]: E0209 00:18:20.905266    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.905308 kubelet[1870]: W0209 00:18:20.905287    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.905308 kubelet[1870]: E0209 00:18:20.905312    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.905773 kubelet[1870]: E0209 00:18:20.905757    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.905944 kubelet[1870]: W0209 00:18:20.905926    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.906099 kubelet[1870]: E0209 00:18:20.906085    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.906508 kubelet[1870]: E0209 00:18:20.906471    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.906508 kubelet[1870]: W0209 00:18:20.906501    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.906670 kubelet[1870]: E0209 00:18:20.906528    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.906981 kubelet[1870]: E0209 00:18:20.906957    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.906981 kubelet[1870]: W0209 00:18:20.906977    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.907172 kubelet[1870]: E0209 00:18:20.906997    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.907240 kubelet[1870]: E0209 00:18:20.907211    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.907240 kubelet[1870]: W0209 00:18:20.907223    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.907361 kubelet[1870]: E0209 00:18:20.907241    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.907445 kubelet[1870]: E0209 00:18:20.907427    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.907529 kubelet[1870]: W0209 00:18:20.907446    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.907529 kubelet[1870]: E0209 00:18:20.907463    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.907771 kubelet[1870]: E0209 00:18:20.907750    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.907771 kubelet[1870]: W0209 00:18:20.907767    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.907935 kubelet[1870]: E0209 00:18:20.907786    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.908046 kubelet[1870]: E0209 00:18:20.908003    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.908046 kubelet[1870]: W0209 00:18:20.908016    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.908046 kubelet[1870]: E0209 00:18:20.908036    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.908255 kubelet[1870]: E0209 00:18:20.908231    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.908255 kubelet[1870]: W0209 00:18:20.908253    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.908384 kubelet[1870]: E0209 00:18:20.908270    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.908600 kubelet[1870]: E0209 00:18:20.908580    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.908600 kubelet[1870]: W0209 00:18:20.908595    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.908778 kubelet[1870]: E0209 00:18:20.908617    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.908854 kubelet[1870]: E0209 00:18:20.908837    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.908936 kubelet[1870]: W0209 00:18:20.908856    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.908936 kubelet[1870]: E0209 00:18:20.908874    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.909093 kubelet[1870]: E0209 00:18:20.909081    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.909167 kubelet[1870]: W0209 00:18:20.909094    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.909167 kubelet[1870]: E0209 00:18:20.909111    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.909340 kubelet[1870]: E0209 00:18:20.909318    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.909340 kubelet[1870]: W0209 00:18:20.909334    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.909517 kubelet[1870]: E0209 00:18:20.909352    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.909594 kubelet[1870]: E0209 00:18:20.909568    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.909594 kubelet[1870]: W0209 00:18:20.909582    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.909718 kubelet[1870]: E0209 00:18:20.909601    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.909822 kubelet[1870]: E0209 00:18:20.909801    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.909822 kubelet[1870]: W0209 00:18:20.909817    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.909975 kubelet[1870]: E0209 00:18:20.909834    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.910096 kubelet[1870]: E0209 00:18:20.910032    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.910096 kubelet[1870]: W0209 00:18:20.910046    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.910096 kubelet[1870]: E0209 00:18:20.910067    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.921060 kubelet[1870]: E0209 00:18:20.921042    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.921138 kubelet[1870]: W0209 00:18:20.921055    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.921138 kubelet[1870]: E0209 00:18:20.921081    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.921353 kubelet[1870]: E0209 00:18:20.921331    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.921353 kubelet[1870]: W0209 00:18:20.921344    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.921471 kubelet[1870]: E0209 00:18:20.921364    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.921628 kubelet[1870]: E0209 00:18:20.921610    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.921691 kubelet[1870]: W0209 00:18:20.921629    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.921691 kubelet[1870]: E0209 00:18:20.921650    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.921882 kubelet[1870]: E0209 00:18:20.921866    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.921949 kubelet[1870]: W0209 00:18:20.921880    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.921949 kubelet[1870]: E0209 00:18:20.921909    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.922111 kubelet[1870]: E0209 00:18:20.922096    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.922111 kubelet[1870]: W0209 00:18:20.922108    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.922201 kubelet[1870]: E0209 00:18:20.922127    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.922363 kubelet[1870]: E0209 00:18:20.922347    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.922363 kubelet[1870]: W0209 00:18:20.922360    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.922491 kubelet[1870]: E0209 00:18:20.922445    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.922740 kubelet[1870]: E0209 00:18:20.922724    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.922740 kubelet[1870]: W0209 00:18:20.922736    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.922861 kubelet[1870]: E0209 00:18:20.922755    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.922993 kubelet[1870]: E0209 00:18:20.922973    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.922993 kubelet[1870]: W0209 00:18:20.922985    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.923113 kubelet[1870]: E0209 00:18:20.923005    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.923222 kubelet[1870]: E0209 00:18:20.923207    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.923222 kubelet[1870]: W0209 00:18:20.923219    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.923315 kubelet[1870]: E0209 00:18:20.923247    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.923502 kubelet[1870]: E0209 00:18:20.923475    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.923572 kubelet[1870]: W0209 00:18:20.923554    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.923645 kubelet[1870]: E0209 00:18:20.923579    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.923934 kubelet[1870]: E0209 00:18:20.923918    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.923934 kubelet[1870]: W0209 00:18:20.923931    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.924049 kubelet[1870]: E0209 00:18:20.924023    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:20.924181 kubelet[1870]: E0209 00:18:20.924166    1870 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Feb  9 00:18:20.924181 kubelet[1870]: W0209 00:18:20.924177    1870 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Feb  9 00:18:20.924257 kubelet[1870]: E0209 00:18:20.924193    1870 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Feb  9 00:18:21.566226 kubelet[1870]: E0209 00:18:21.566166    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:21.611611 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount746731225.mount: Deactivated successfully.
Feb  9 00:18:22.566732 kubelet[1870]: E0209 00:18:22.566679    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:22.832415 kubelet[1870]: E0209 00:18:22.832028    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:23.244167 env[1312]: time="2024-02-09T00:18:23.244114920Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:23.250464 env[1312]: time="2024-02-09T00:18:23.250423612Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:23.254571 env[1312]: time="2024-02-09T00:18:23.254535472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:23.259717 env[1312]: time="2024-02-09T00:18:23.259684647Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:23.260551 env[1312]: time="2024-02-09T00:18:23.260517559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\""
Feb  9 00:18:23.262526 env[1312]: time="2024-02-09T00:18:23.262497088Z" level=info msg="CreateContainer within sandbox \"c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Feb  9 00:18:23.283665 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2550106608.mount: Deactivated successfully.
Feb  9 00:18:23.299260 env[1312]: time="2024-02-09T00:18:23.299214523Z" level=info msg="CreateContainer within sandbox \"c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622\""
Feb  9 00:18:23.299802 env[1312]: time="2024-02-09T00:18:23.299772831Z" level=info msg="StartContainer for \"f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622\""
Feb  9 00:18:23.326919 systemd[1]: Started cri-containerd-f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622.scope.
Feb  9 00:18:23.340000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.346445 kernel: kauditd_printk_skb: 345 callbacks suppressed
Feb  9 00:18:23.346550 kernel: audit: type=1400 audit(1707437903.340:652): avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.340000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1996 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:23.402065 kernel: audit: type=1300 audit(1707437903.340:652): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1996 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:23.402197 kernel: audit: type=1327 audit(1707437903.340:652): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333235323864653130613435626333316630633866663865633536
Feb  9 00:18:23.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333235323864653130613435626333316630633866663865633536
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.416555 kernel: audit: type=1400 audit(1707437903.345:653): avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.430343 env[1312]: time="2024-02-09T00:18:23.420832096Z" level=info msg="StartContainer for \"f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622\" returns successfully"
Feb  9 00:18:23.431320 kernel: audit: type=1400 audit(1707437903.345:653): avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.430642 systemd[1]: cri-containerd-f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622.scope: Deactivated successfully.
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.457793 kernel: audit: type=1400 audit(1707437903.345:653): avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.457890 kernel: audit: type=1400 audit(1707437903.345:653): avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.471092 kernel: audit: type=1400 audit(1707437903.345:653): avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.528504 kernel: audit: type=1400 audit(1707437903.345:653): avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.528612 kernel: audit: type=1400 audit(1707437903.345:653): avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.345000 audit: BPF prog-id=73 op=LOAD
Feb  9 00:18:23.345000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003de200 items=0 ppid=1996 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:23.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333235323864653130613435626333316630633866663865633536
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit: BPF prog-id=74 op=LOAD
Feb  9 00:18:23.359000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003de248 items=0 ppid=1996 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:23.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333235323864653130613435626333316630633866663865633536
Feb  9 00:18:23.359000 audit: BPF prog-id=74 op=UNLOAD
Feb  9 00:18:23.359000 audit: BPF prog-id=73 op=UNLOAD
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { perfmon } for  pid=2269 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit[2269]: AVC avc:  denied  { bpf } for  pid=2269 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:23.359000 audit: BPF prog-id=75 op=LOAD
Feb  9 00:18:23.359000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003de2d8 items=0 ppid=1996 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:23.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333235323864653130613435626333316630633866663865633536
Feb  9 00:18:23.444000 audit: BPF prog-id=75 op=UNLOAD
Feb  9 00:18:23.567564 kubelet[1870]: E0209 00:18:23.567522    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:24.180294 env[1312]: time="2024-02-09T00:18:24.180228000Z" level=info msg="shim disconnected" id=f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622
Feb  9 00:18:24.180294 env[1312]: time="2024-02-09T00:18:24.180288301Z" level=warning msg="cleaning up after shim disconnected" id=f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622 namespace=k8s.io
Feb  9 00:18:24.180294 env[1312]: time="2024-02-09T00:18:24.180303001Z" level=info msg="cleaning up dead shim"
Feb  9 00:18:24.188329 env[1312]: time="2024-02-09T00:18:24.188287414Z" level=warning msg="cleanup warnings time=\"2024-02-09T00:18:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2317 runtime=io.containerd.runc.v2\n"
Feb  9 00:18:24.281229 systemd[1]: run-containerd-runc-k8s.io-f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622-runc.DBRfEa.mount: Deactivated successfully.
Feb  9 00:18:24.281372 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f432528de10a45bc31f0c8ff8ec563be266ad2487f436b7c0b91e62cb538f622-rootfs.mount: Deactivated successfully.
Feb  9 00:18:24.568645 kubelet[1870]: E0209 00:18:24.568505    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:24.832026 kubelet[1870]: E0209 00:18:24.831869    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:24.884403 env[1312]: time="2024-02-09T00:18:24.884359296Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\""
Feb  9 00:18:25.569576 kubelet[1870]: E0209 00:18:25.569543    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:26.570138 kubelet[1870]: E0209 00:18:26.570094    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:26.832580 kubelet[1870]: E0209 00:18:26.832252    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:27.570575 kubelet[1870]: E0209 00:18:27.570540    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:28.571744 kubelet[1870]: E0209 00:18:28.571703    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:28.832834 kubelet[1870]: E0209 00:18:28.832446    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:29.572820 kubelet[1870]: E0209 00:18:29.572755    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:30.573781 kubelet[1870]: E0209 00:18:30.573726    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:30.832413 kubelet[1870]: E0209 00:18:30.832288    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:31.573917 kubelet[1870]: E0209 00:18:31.573878    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:32.574845 kubelet[1870]: E0209 00:18:32.574752    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:32.832454 kubelet[1870]: E0209 00:18:32.832309    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:33.575885 kubelet[1870]: E0209 00:18:33.575833    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:34.576495 kubelet[1870]: E0209 00:18:34.576460    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:34.832172 kubelet[1870]: E0209 00:18:34.832035    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:35.545121 kubelet[1870]: E0209 00:18:35.545042    1870 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:35.577680 kubelet[1870]: E0209 00:18:35.577604    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:36.577849 kubelet[1870]: E0209 00:18:36.577777    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:36.832209 kubelet[1870]: E0209 00:18:36.831830    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:37.578508 kubelet[1870]: E0209 00:18:37.578451    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:38.579739 kubelet[1870]: E0209 00:18:38.579693    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:38.832822 kubelet[1870]: E0209 00:18:38.832385    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:39.580582 kubelet[1870]: E0209 00:18:39.580531    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:40.581352 kubelet[1870]: E0209 00:18:40.581319    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:40.832372 kubelet[1870]: E0209 00:18:40.832243    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:41.581962 kubelet[1870]: E0209 00:18:41.581891    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:42.582777 kubelet[1870]: E0209 00:18:42.582723    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:42.832128 kubelet[1870]: E0209 00:18:42.832084    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:43.582883 kubelet[1870]: E0209 00:18:43.582827    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:44.583867 kubelet[1870]: E0209 00:18:44.583816    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:44.831931 kubelet[1870]: E0209 00:18:44.831878    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:45.584689 kubelet[1870]: E0209 00:18:45.584590    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:46.585419 kubelet[1870]: E0209 00:18:46.585371    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:46.832520 kubelet[1870]: E0209 00:18:46.832206    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:47.585625 kubelet[1870]: E0209 00:18:47.585570    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:48.586269 kubelet[1870]: E0209 00:18:48.586227    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:48.832779 kubelet[1870]: E0209 00:18:48.832390    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:49.587259 kubelet[1870]: E0209 00:18:49.587195    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:50.588176 kubelet[1870]: E0209 00:18:50.588112    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:50.832389 kubelet[1870]: E0209 00:18:50.831964    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:51.386229 env[1312]: time="2024-02-09T00:18:51.386121386Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:51.392213 env[1312]: time="2024-02-09T00:18:51.392114030Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:51.395111 env[1312]: time="2024-02-09T00:18:51.395079452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:51.401497 env[1312]: time="2024-02-09T00:18:51.401452699Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:18:51.402203 env[1312]: time="2024-02-09T00:18:51.402168005Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\""
Feb  9 00:18:51.404314 env[1312]: time="2024-02-09T00:18:51.404289821Z" level=info msg="CreateContainer within sandbox \"c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Feb  9 00:18:51.441335 env[1312]: time="2024-02-09T00:18:51.441287995Z" level=info msg="CreateContainer within sandbox \"c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a9703234e65733ac08a68727618065fd5dd4c6d81ebe3014edf527d30f1533f9\""
Feb  9 00:18:51.441826 env[1312]: time="2024-02-09T00:18:51.441767099Z" level=info msg="StartContainer for \"a9703234e65733ac08a68727618065fd5dd4c6d81ebe3014edf527d30f1533f9\""
Feb  9 00:18:51.467963 systemd[1]: Started cri-containerd-a9703234e65733ac08a68727618065fd5dd4c6d81ebe3014edf527d30f1533f9.scope.
Feb  9 00:18:51.498465 kernel: kauditd_printk_skb: 34 callbacks suppressed
Feb  9 00:18:51.498656 kernel: audit: type=1400 audit(1707437931.480:659): avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1996 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:51.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373033323334653635373333616330386136383732373631383036
Feb  9 00:18:51.536254 kernel: audit: type=1300 audit(1707437931.480:659): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1996 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:51.536382 kernel: audit: type=1327 audit(1707437931.480:659): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373033323334653635373333616330386136383732373631383036
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.563883 kernel: audit: type=1400 audit(1707437931.480:660): avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.563982 kernel: audit: type=1400 audit(1707437931.480:660): avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.564008 kernel: audit: type=1400 audit(1707437931.480:660): avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.570906 env[1312]: time="2024-02-09T00:18:51.570868558Z" level=info msg="StartContainer for \"a9703234e65733ac08a68727618065fd5dd4c6d81ebe3014edf527d30f1533f9\" returns successfully"
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.588627 kubelet[1870]: E0209 00:18:51.588407    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:51.591069 kernel: audit: type=1400 audit(1707437931.480:660): avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.603853 kernel: audit: type=1400 audit(1707437931.480:660): avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.631045 kernel: audit: type=1400 audit(1707437931.480:660): avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.631130 kernel: audit: type=1400 audit(1707437931.480:660): avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.480000 audit: BPF prog-id=76 op=LOAD
Feb  9 00:18:51.480000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00032e390 items=0 ppid=1996 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:51.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373033323334653635373333616330386136383732373631383036
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit: BPF prog-id=77 op=LOAD
Feb  9 00:18:51.498000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00032e3d8 items=0 ppid=1996 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:51.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373033323334653635373333616330386136383732373631383036
Feb  9 00:18:51.498000 audit: BPF prog-id=77 op=UNLOAD
Feb  9 00:18:51.498000 audit: BPF prog-id=76 op=UNLOAD
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:18:51.498000 audit: BPF prog-id=78 op=LOAD
Feb  9 00:18:51.498000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00032e468 items=0 ppid=1996 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:18:51.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373033323334653635373333616330386136383732373631383036
Feb  9 00:18:52.588893 kubelet[1870]: E0209 00:18:52.588841    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:52.832152 kubelet[1870]: E0209 00:18:52.832099    1870 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:53.322848 env[1312]: time="2024-02-09T00:18:53.322781724Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Feb  9 00:18:53.325191 systemd[1]: cri-containerd-a9703234e65733ac08a68727618065fd5dd4c6d81ebe3014edf527d30f1533f9.scope: Deactivated successfully.
Feb  9 00:18:53.327000 audit: BPF prog-id=78 op=UNLOAD
Feb  9 00:18:53.345873 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a9703234e65733ac08a68727618065fd5dd4c6d81ebe3014edf527d30f1533f9-rootfs.mount: Deactivated successfully.
Feb  9 00:18:53.411605 kubelet[1870]: I0209 00:18:53.411565    1870 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Feb  9 00:18:53.926014 kubelet[1870]: E0209 00:18:53.589931    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:54.591015 kubelet[1870]: E0209 00:18:54.590951    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:54.837631 systemd[1]: Created slice kubepods-besteffort-pod155d0c6d_0e58_4536_8ce2_58eb7a4d42f7.slice.
Feb  9 00:18:54.840588 env[1312]: time="2024-02-09T00:18:54.840551015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76n98,Uid:155d0c6d-0e58-4536-8ce2-58eb7a4d42f7,Namespace:calico-system,Attempt:0,}"
Feb  9 00:18:54.978480 env[1312]: time="2024-02-09T00:18:54.978430877Z" level=info msg="shim disconnected" id=a9703234e65733ac08a68727618065fd5dd4c6d81ebe3014edf527d30f1533f9
Feb  9 00:18:54.978480 env[1312]: time="2024-02-09T00:18:54.978473078Z" level=warning msg="cleaning up after shim disconnected" id=a9703234e65733ac08a68727618065fd5dd4c6d81ebe3014edf527d30f1533f9 namespace=k8s.io
Feb  9 00:18:54.978480 env[1312]: time="2024-02-09T00:18:54.978500178Z" level=info msg="cleaning up dead shim"
Feb  9 00:18:54.986308 env[1312]: time="2024-02-09T00:18:54.986264832Z" level=warning msg="cleanup warnings time=\"2024-02-09T00:18:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2384 runtime=io.containerd.runc.v2\n"
Feb  9 00:18:55.047696 env[1312]: time="2024-02-09T00:18:55.047626153Z" level=error msg="Failed to destroy network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:55.050572 env[1312]: time="2024-02-09T00:18:55.049922069Z" level=error msg="encountered an error cleaning up failed sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:55.050572 env[1312]: time="2024-02-09T00:18:55.049999870Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76n98,Uid:155d0c6d-0e58-4536-8ce2-58eb7a4d42f7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:55.050703 kubelet[1870]: E0209 00:18:55.050244    1870 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:55.050703 kubelet[1870]: E0209 00:18:55.050308    1870 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-76n98"
Feb  9 00:18:55.050703 kubelet[1870]: E0209 00:18:55.050338    1870 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-76n98"
Feb  9 00:18:55.049500 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d-shm.mount: Deactivated successfully.
Feb  9 00:18:55.051074 kubelet[1870]: E0209 00:18:55.050400    1870 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-76n98_calico-system(155d0c6d-0e58-4536-8ce2-58eb7a4d42f7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-76n98_calico-system(155d0c6d-0e58-4536-8ce2-58eb7a4d42f7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:55.545461 kubelet[1870]: E0209 00:18:55.545407    1870 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:55.591208 kubelet[1870]: E0209 00:18:55.591153    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:55.941154 env[1312]: time="2024-02-09T00:18:55.941110860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\""
Feb  9 00:18:55.941617 kubelet[1870]: I0209 00:18:55.941429    1870 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:18:55.942124 env[1312]: time="2024-02-09T00:18:55.942088167Z" level=info msg="StopPodSandbox for \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\""
Feb  9 00:18:55.967023 env[1312]: time="2024-02-09T00:18:55.966967037Z" level=error msg="StopPodSandbox for \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\" failed" error="failed to destroy network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:55.967223 kubelet[1870]: E0209 00:18:55.967200    1870 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:18:55.967323 kubelet[1870]: E0209 00:18:55.967283    1870 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d}
Feb  9 00:18:55.967376 kubelet[1870]: E0209 00:18:55.967346    1870 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Feb  9 00:18:55.967468 kubelet[1870]: E0209 00:18:55.967387    1870 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-76n98" podUID=155d0c6d-0e58-4536-8ce2-58eb7a4d42f7
Feb  9 00:18:56.164547 kubelet[1870]: I0209 00:18:56.164510    1870 topology_manager.go:210] "Topology Admit Handler"
Feb  9 00:18:56.170435 systemd[1]: Created slice kubepods-besteffort-podc9123bfb_8eb2_4219_92de_41d7ef8faa20.slice.
Feb  9 00:18:56.363819 kubelet[1870]: I0209 00:18:56.363657    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9422p\" (UniqueName: \"kubernetes.io/projected/c9123bfb-8eb2-4219-92de-41d7ef8faa20-kube-api-access-9422p\") pod \"nginx-deployment-8ffc5cf85-hm47w\" (UID: \"c9123bfb-8eb2-4219-92de-41d7ef8faa20\") " pod="default/nginx-deployment-8ffc5cf85-hm47w"
Feb  9 00:18:56.479037 env[1312]: time="2024-02-09T00:18:56.478982571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-hm47w,Uid:c9123bfb-8eb2-4219-92de-41d7ef8faa20,Namespace:default,Attempt:0,}"
Feb  9 00:18:56.566595 env[1312]: time="2024-02-09T00:18:56.566535958Z" level=error msg="Failed to destroy network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:56.568421 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3-shm.mount: Deactivated successfully.
Feb  9 00:18:56.569350 env[1312]: time="2024-02-09T00:18:56.569298776Z" level=error msg="encountered an error cleaning up failed sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:56.569453 env[1312]: time="2024-02-09T00:18:56.569370577Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-hm47w,Uid:c9123bfb-8eb2-4219-92de-41d7ef8faa20,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:56.569639 kubelet[1870]: E0209 00:18:56.569615    1870 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:56.569726 kubelet[1870]: E0209 00:18:56.569674    1870 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-hm47w"
Feb  9 00:18:56.569726 kubelet[1870]: E0209 00:18:56.569704    1870 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-hm47w"
Feb  9 00:18:56.569810 kubelet[1870]: E0209 00:18:56.569775    1870 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-hm47w_default(c9123bfb-8eb2-4219-92de-41d7ef8faa20)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-hm47w_default(c9123bfb-8eb2-4219-92de-41d7ef8faa20)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-hm47w" podUID=c9123bfb-8eb2-4219-92de-41d7ef8faa20
Feb  9 00:18:56.592110 kubelet[1870]: E0209 00:18:56.592074    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:56.944185 kubelet[1870]: I0209 00:18:56.944151    1870 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:18:56.945042 env[1312]: time="2024-02-09T00:18:56.944987093Z" level=info msg="StopPodSandbox for \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\""
Feb  9 00:18:56.967941 env[1312]: time="2024-02-09T00:18:56.967893546Z" level=error msg="StopPodSandbox for \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\" failed" error="failed to destroy network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Feb  9 00:18:56.968243 kubelet[1870]: E0209 00:18:56.968212    1870 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:18:56.968365 kubelet[1870]: E0209 00:18:56.968259    1870 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3}
Feb  9 00:18:56.968365 kubelet[1870]: E0209 00:18:56.968304    1870 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c9123bfb-8eb2-4219-92de-41d7ef8faa20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Feb  9 00:18:56.968365 kubelet[1870]: E0209 00:18:56.968340    1870 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c9123bfb-8eb2-4219-92de-41d7ef8faa20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-hm47w" podUID=c9123bfb-8eb2-4219-92de-41d7ef8faa20
Feb  9 00:18:57.592993 kubelet[1870]: E0209 00:18:57.592948    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:58.593314 kubelet[1870]: E0209 00:18:58.593244    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:18:59.594368 kubelet[1870]: E0209 00:18:59.594299    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:00.595420 kubelet[1870]: E0209 00:19:00.595348    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:01.595678 kubelet[1870]: E0209 00:19:01.595632    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:02.596444 kubelet[1870]: E0209 00:19:02.596374    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:02.729675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1436505048.mount: Deactivated successfully.
Feb  9 00:19:02.844925 env[1312]: time="2024-02-09T00:19:02.844876575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:02.851818 env[1312]: time="2024-02-09T00:19:02.851383614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:02.855191 env[1312]: time="2024-02-09T00:19:02.855161837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:02.859206 env[1312]: time="2024-02-09T00:19:02.859177361Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:02.859584 env[1312]: time="2024-02-09T00:19:02.859554763Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\""
Feb  9 00:19:02.874330 env[1312]: time="2024-02-09T00:19:02.874293351Z" level=info msg="CreateContainer within sandbox \"c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Feb  9 00:19:02.906538 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3919164580.mount: Deactivated successfully.
Feb  9 00:19:02.922146 env[1312]: time="2024-02-09T00:19:02.922099836Z" level=info msg="CreateContainer within sandbox \"c6843eac174845c9dd799f9b1210bf87c84360c355bdc2108d19c55df50c9e31\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fc38d8d06ee635614014c8e1b630b9fc41182c5a5d5e6c5ae1816fca25e5f6de\""
Feb  9 00:19:02.922896 env[1312]: time="2024-02-09T00:19:02.922868740Z" level=info msg="StartContainer for \"fc38d8d06ee635614014c8e1b630b9fc41182c5a5d5e6c5ae1816fca25e5f6de\""
Feb  9 00:19:02.940424 systemd[1]: Started cri-containerd-fc38d8d06ee635614014c8e1b630b9fc41182c5a5d5e6c5ae1816fca25e5f6de.scope.
Feb  9 00:19:02.979005 kernel: kauditd_printk_skb: 34 callbacks suppressed
Feb  9 00:19:02.979150 kernel: audit: type=1400 audit(1707437942.960:666): avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=1996 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:02.998595 kernel: audit: type=1300 audit(1707437942.960:666): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=1996 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:02.998680 kernel: audit: type=1327 audit(1707437942.960:666): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663333864386430366565363335363134303134633865316236333062
Feb  9 00:19:02.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663333864386430366565363335363134303134633865316236333062
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:03.031529 kernel: audit: type=1400 audit(1707437942.960:667): avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:03.035508 kernel: audit: type=1400 audit(1707437942.960:667): avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:03.060604 kernel: audit: type=1400 audit(1707437942.960:667): avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:03.073189 kernel: audit: type=1400 audit(1707437942.960:667): avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:03.087600 kernel: audit: type=1400 audit(1707437942.960:667): avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:03.088023 env[1312]: time="2024-02-09T00:19:03.087985415Z" level=info msg="StartContainer for \"fc38d8d06ee635614014c8e1b630b9fc41182c5a5d5e6c5ae1816fca25e5f6de\" returns successfully"
Feb  9 00:19:03.101664 kernel: audit: type=1400 audit(1707437942.960:667): avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.960000 audit: BPF prog-id=79 op=LOAD
Feb  9 00:19:02.960000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001959d8 a2=78 a3=c00027e490 items=0 ppid=1996 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:02.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663333864386430366565363335363134303134633865316236333062
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit: BPF prog-id=80 op=LOAD
Feb  9 00:19:02.978000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000195770 a2=78 a3=c00027e4d8 items=0 ppid=1996 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:02.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663333864386430366565363335363134303134633865316236333062
Feb  9 00:19:02.978000 audit: BPF prog-id=80 op=UNLOAD
Feb  9 00:19:02.978000 audit: BPF prog-id=79 op=UNLOAD
Feb  9 00:19:03.116505 kernel: audit: type=1400 audit(1707437942.960:667): avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { perfmon } for  pid=2510 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit[2510]: AVC avc:  denied  { bpf } for  pid=2510 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:02.978000 audit: BPF prog-id=81 op=LOAD
Feb  9 00:19:02.978000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000195c30 a2=78 a3=c00027e568 items=0 ppid=1996 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:02.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663333864386430366565363335363134303134633865316236333062
Feb  9 00:19:03.446215 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Feb  9 00:19:03.446376 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Feb  9 00:19:03.597034 kubelet[1870]: E0209 00:19:03.596946    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:03.974661 kubelet[1870]: I0209 00:19:03.974624    1870 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-5frls" podStartSLOduration=-9.223371980880192e+09 pod.CreationTimestamp="2024-02-09 00:18:08 +0000 UTC" firstStartedPulling="2024-02-09 00:18:17.834601807 +0000 UTC m=+22.792265194" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:19:03.974048298 +0000 UTC m=+68.931711985" watchObservedRunningTime="2024-02-09 00:19:03.974584801 +0000 UTC m=+68.932248188"
Feb  9 00:19:03.994371 systemd[1]: run-containerd-runc-k8s.io-fc38d8d06ee635614014c8e1b630b9fc41182c5a5d5e6c5ae1816fca25e5f6de-runc.NoGXcb.mount: Deactivated successfully.
Feb  9 00:19:04.597839 kubelet[1870]: E0209 00:19:04.597784    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:04.745000 audit[2626]: AVC avc:  denied  { write } for  pid=2626 comm="tee" name="fd" dev="proc" ino=22520 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 00:19:04.750000 audit[2629]: AVC avc:  denied  { write } for  pid=2629 comm="tee" name="fd" dev="proc" ino=23344 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 00:19:04.750000 audit[2629]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7271f97e a2=241 a3=1b6 items=1 ppid=2599 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:04.750000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Feb  9 00:19:04.750000 audit: PATH item=0 name="/dev/fd/63" inode=23331 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:04.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 00:19:04.745000 audit[2626]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd3d1797e a2=241 a3=1b6 items=1 ppid=2600 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:04.760000 audit[2640]: AVC avc:  denied  { write } for  pid=2640 comm="tee" name="fd" dev="proc" ino=23558 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 00:19:04.745000 audit: CWD cwd="/etc/service/enabled/confd/log"
Feb  9 00:19:04.745000 audit: PATH item=0 name="/dev/fd/63" inode=22507 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:04.745000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 00:19:04.765000 audit[2643]: AVC avc:  denied  { write } for  pid=2643 comm="tee" name="fd" dev="proc" ino=23355 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 00:19:04.765000 audit[2643]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9956297f a2=241 a3=1b6 items=1 ppid=2619 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:04.765000 audit: CWD cwd="/etc/service/enabled/bird/log"
Feb  9 00:19:04.765000 audit: PATH item=0 name="/dev/fd/63" inode=23351 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:04.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 00:19:04.760000 audit[2640]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddbc4d96f a2=241 a3=1b6 items=1 ppid=2613 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:04.760000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Feb  9 00:19:04.760000 audit: PATH item=0 name="/dev/fd/63" inode=23348 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:04.760000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 00:19:04.771000 audit[2650]: AVC avc:  denied  { write } for  pid=2650 comm="tee" name="fd" dev="proc" ino=23361 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 00:19:04.771000 audit[2650]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf3ccc980 a2=241 a3=1b6 items=1 ppid=2615 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:04.771000 audit: CWD cwd="/etc/service/enabled/cni/log"
Feb  9 00:19:04.771000 audit: PATH item=0 name="/dev/fd/63" inode=23352 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:04.771000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 00:19:04.777000 audit[2656]: AVC avc:  denied  { write } for  pid=2656 comm="tee" name="fd" dev="proc" ino=23365 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 00:19:04.777000 audit[2656]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff082b797e a2=241 a3=1b6 items=1 ppid=2610 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:04.777000 audit: CWD cwd="/etc/service/enabled/felix/log"
Feb  9 00:19:04.777000 audit: PATH item=0 name="/dev/fd/63" inode=23565 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:04.777000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 00:19:04.783000 audit[2653]: AVC avc:  denied  { write } for  pid=2653 comm="tee" name="fd" dev="proc" ino=23574 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Feb  9 00:19:04.783000 audit[2653]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd941f896e a2=241 a3=1b6 items=1 ppid=2617 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:04.783000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Feb  9 00:19:04.783000 audit: PATH item=0 name="/dev/fd/63" inode=23562 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:04.783000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Feb  9 00:19:04.986447 systemd[1]: run-containerd-runc-k8s.io-fc38d8d06ee635614014c8e1b630b9fc41182c5a5d5e6c5ae1816fca25e5f6de-runc.IEXutN.mount: Deactivated successfully.
Feb  9 00:19:05.055507 kernel: Initializing XFRM netlink socket
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit: BPF prog-id=82 op=LOAD
Feb  9 00:19:05.190000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdde9fa9e0 a2=70 a3=7fc470549000 items=0 ppid=2612 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 00:19:05.190000 audit: BPF prog-id=82 op=UNLOAD
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit: BPF prog-id=83 op=LOAD
Feb  9 00:19:05.190000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdde9fa9e0 a2=70 a3=6e items=0 ppid=2612 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 00:19:05.190000 audit: BPF prog-id=83 op=UNLOAD
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdde9fa990 a2=70 a3=7ffdde9fa9e0 items=0 ppid=2612 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit: BPF prog-id=84 op=LOAD
Feb  9 00:19:05.190000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdde9fa970 a2=70 a3=7ffdde9fa9e0 items=0 ppid=2612 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 00:19:05.190000 audit: BPF prog-id=84 op=UNLOAD
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdde9faa50 a2=70 a3=0 items=0 ppid=2612 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdde9faa40 a2=70 a3=0 items=0 ppid=2612 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 00:19:05.190000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.190000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdde9faa80 a2=70 a3=0 items=0 ppid=2612 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { perfmon } for  pid=2760 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit[2760]: AVC avc:  denied  { bpf } for  pid=2760 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.191000 audit: BPF prog-id=85 op=LOAD
Feb  9 00:19:05.191000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdde9fa9a0 a2=70 a3=ffffffff items=0 ppid=2612 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.191000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Feb  9 00:19:05.197000 audit[2762]: AVC avc:  denied  { bpf } for  pid=2762 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.197000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd0969e0 a2=70 a3=fff80800 items=0 ppid=2612 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.197000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Feb  9 00:19:05.197000 audit[2762]: AVC avc:  denied  { bpf } for  pid=2762 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:05.197000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd0968b0 a2=70 a3=3 items=0 ppid=2612 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.197000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Feb  9 00:19:05.205000 audit: BPF prog-id=85 op=UNLOAD
Feb  9 00:19:05.305000 audit[2785]: NETFILTER_CFG table=mangle:82 family=2 entries=19 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:19:05.305000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdb53c46d0 a2=0 a3=7ffdb53c46bc items=0 ppid=2612 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.305000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:19:05.319000 audit[2788]: NETFILTER_CFG table=nat:83 family=2 entries=16 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:19:05.319000 audit[2788]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffc0919c10 a2=0 a3=7fffc0919bfc items=0 ppid=2612 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.319000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:19:05.320000 audit[2787]: NETFILTER_CFG table=filter:84 family=2 entries=39 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:19:05.320000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc12f769d0 a2=0 a3=557032a39000 items=0 ppid=2612 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.320000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:19:05.344000 audit[2784]: NETFILTER_CFG table=raw:85 family=2 entries=19 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:19:05.344000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff3bd959b0 a2=0 a3=558c9ea60000 items=0 ppid=2612 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:05.344000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:19:05.598074 kubelet[1870]: E0209 00:19:05.597937    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:06.098694 systemd-networkd[1457]: vxlan.calico: Link UP
Feb  9 00:19:06.098709 systemd-networkd[1457]: vxlan.calico: Gained carrier
Feb  9 00:19:06.598465 kubelet[1870]: E0209 00:19:06.598412    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:07.346918 systemd-networkd[1457]: vxlan.calico: Gained IPv6LL
Feb  9 00:19:07.599595 kubelet[1870]: E0209 00:19:07.599343    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:08.600357 kubelet[1870]: E0209 00:19:08.600299    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:08.832463 env[1312]: time="2024-02-09T00:19:08.832323871Z" level=info msg="StopPodSandbox for \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\""
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.898 [INFO][2815] k8s.go 578: Cleaning up netns ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.898 [INFO][2815] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" iface="eth0" netns="/var/run/netns/cni-0b0dff00-536f-dc01-7cf1-49c671f0953c"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.898 [INFO][2815] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" iface="eth0" netns="/var/run/netns/cni-0b0dff00-536f-dc01-7cf1-49c671f0953c"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.898 [INFO][2815] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" iface="eth0" netns="/var/run/netns/cni-0b0dff00-536f-dc01-7cf1-49c671f0953c"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.898 [INFO][2815] k8s.go 585: Releasing IP address(es) ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.898 [INFO][2815] utils.go 188: Calico CNI releasing IP address ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.916 [INFO][2822] ipam_plugin.go 415: Releasing address using handleID ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.917 [INFO][2822] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.917 [INFO][2822] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.927 [WARNING][2822] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.927 [INFO][2822] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.928 [INFO][2822] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:08.930709 env[1312]: 2024-02-09 00:19:08.929 [INFO][2815] k8s.go 591: Teardown processing complete. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:08.933986 systemd[1]: run-netns-cni\x2d0b0dff00\x2d536f\x2ddc01\x2d7cf1\x2d49c671f0953c.mount: Deactivated successfully.
Feb  9 00:19:08.935051 env[1312]: time="2024-02-09T00:19:08.934996420Z" level=info msg="TearDown network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\" successfully"
Feb  9 00:19:08.935051 env[1312]: time="2024-02-09T00:19:08.935043720Z" level=info msg="StopPodSandbox for \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\" returns successfully"
Feb  9 00:19:08.935814 env[1312]: time="2024-02-09T00:19:08.935774124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76n98,Uid:155d0c6d-0e58-4536-8ce2-58eb7a4d42f7,Namespace:calico-system,Attempt:1,}"
Feb  9 00:19:09.091557 systemd-networkd[1457]: cali47d1ac121ae: Link UP
Feb  9 00:19:09.099510 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 00:19:09.099587 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali47d1ac121ae: link becomes ready
Feb  9 00:19:09.106373 systemd-networkd[1457]: cali47d1ac121ae: Gained carrier
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.013 [INFO][2829] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.12-k8s-csi--node--driver--76n98-eth0 csi-node-driver- calico-system  155d0c6d-0e58-4536-8ce2-58eb7a4d42f7 1358 0 2024-02-09 00:18:08 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.200.8.12  csi-node-driver-76n98 eth0 default [] []   [kns.calico-system ksa.calico-system.default] cali47d1ac121ae  [] []}} ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Namespace="calico-system" Pod="csi-node-driver-76n98" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--76n98-"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.013 [INFO][2829] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Namespace="calico-system" Pod="csi-node-driver-76n98" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.036 [INFO][2841] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" HandleID="k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.048 [INFO][2841] ipam_plugin.go 268: Auto assigning IP ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" HandleID="k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d880), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.12", "pod":"csi-node-driver-76n98", "timestamp":"2024-02-09 00:19:09.036780161 +0000 UTC"}, Hostname:"10.200.8.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.049 [INFO][2841] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.049 [INFO][2841] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.049 [INFO][2841] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.12'
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.050 [INFO][2841] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.054 [INFO][2841] ipam.go 372: Looking up existing affinities for host host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.060 [INFO][2841] ipam.go 489: Trying affinity for 192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.061 [INFO][2841] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.066 [INFO][2841] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.066 [INFO][2841] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.068 [INFO][2841] ipam.go 1682: Creating new handle: k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.073 [INFO][2841] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.085 [INFO][2841] ipam.go 1216: Successfully claimed IPs: [192.168.25.193/26] block=192.168.25.192/26 handle="k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.085 [INFO][2841] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.193/26] handle="k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" host="10.200.8.12"
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.085 [INFO][2841] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:09.115582 env[1312]: 2024-02-09 00:19:09.085 [INFO][2841] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.25.193/26] IPv6=[] ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" HandleID="k8s-pod-network.5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:09.122226 env[1312]: 2024-02-09 00:19:09.087 [INFO][2829] k8s.go 385: Populated endpoint ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Namespace="calico-system" Pod="csi-node-driver-76n98" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--76n98-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-csi--node--driver--76n98-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 18, 8, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"", Pod:"csi-node-driver-76n98", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali47d1ac121ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:09.122226 env[1312]: 2024-02-09 00:19:09.087 [INFO][2829] k8s.go 386: Calico CNI using IPs: [192.168.25.193/32] ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Namespace="calico-system" Pod="csi-node-driver-76n98" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:09.122226 env[1312]: 2024-02-09 00:19:09.087 [INFO][2829] dataplane_linux.go 68: Setting the host side veth name to cali47d1ac121ae ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Namespace="calico-system" Pod="csi-node-driver-76n98" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:09.122226 env[1312]: 2024-02-09 00:19:09.106 [INFO][2829] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Namespace="calico-system" Pod="csi-node-driver-76n98" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:09.122226 env[1312]: 2024-02-09 00:19:09.107 [INFO][2829] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Namespace="calico-system" Pod="csi-node-driver-76n98" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--76n98-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-csi--node--driver--76n98-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 18, 8, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022", Pod:"csi-node-driver-76n98", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali47d1ac121ae", MAC:"76:9d:da:4d:fe:af", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:09.122226 env[1312]: 2024-02-09 00:19:09.114 [INFO][2829] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022" Namespace="calico-system" Pod="csi-node-driver-76n98" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:09.140000 audit[2863]: NETFILTER_CFG table=filter:86 family=2 entries=36 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:19:09.145203 kernel: kauditd_printk_skb: 151 callbacks suppressed
Feb  9 00:19:09.145294 kernel: audit: type=1325 audit(1707437949.140:697): table=filter:86 family=2 entries=36 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:19:09.140000 audit[2863]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe5f0d56a0 a2=0 a3=7ffe5f0d568c items=0 ppid=2612 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:09.172133 env[1312]: time="2024-02-09T00:19:09.168632654Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 00:19:09.172133 env[1312]: time="2024-02-09T00:19:09.168668755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 00:19:09.172133 env[1312]: time="2024-02-09T00:19:09.168680255Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 00:19:09.172133 env[1312]: time="2024-02-09T00:19:09.168873356Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022 pid=2871 runtime=io.containerd.runc.v2
Feb  9 00:19:09.180432 kernel: audit: type=1300 audit(1707437949.140:697): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe5f0d56a0 a2=0 a3=7ffe5f0d568c items=0 ppid=2612 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:09.140000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:19:09.195600 kernel: audit: type=1327 audit(1707437949.140:697): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:19:09.199873 systemd[1]: Started cri-containerd-5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022.scope.
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.240845 kernel: audit: type=1400 audit(1707437949.211:698): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.240960 kernel: audit: type=1400 audit(1707437949.211:699): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.254833 kernel: audit: type=1400 audit(1707437949.211:700): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.268747 kernel: audit: type=1400 audit(1707437949.211:701): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.282027 kernel: audit: type=1400 audit(1707437949.211:702): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.294831 kernel: audit: type=1400 audit(1707437949.211:703): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.309416 env[1312]: time="2024-02-09T00:19:09.309367894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76n98,Uid:155d0c6d-0e58-4536-8ce2-58eb7a4d42f7,Namespace:calico-system,Attempt:1,} returns sandbox id \"5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022\""
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.211000 audit: BPF prog-id=86 op=LOAD
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:09.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376438323164346165303264643362393130313633323637643338
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:09.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376438323164346165303264643362393130313633323637643338
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.310526 kernel: audit: type=1400 audit(1707437949.211:704): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.217000 audit: BPF prog-id=87 op=LOAD
Feb  9 00:19:09.217000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0c10 items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:09.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376438323164346165303264643362393130313633323637643338
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit: BPF prog-id=88 op=LOAD
Feb  9 00:19:09.226000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a0c58 items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:09.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376438323164346165303264643362393130313633323637643338
Feb  9 00:19:09.226000 audit: BPF prog-id=88 op=UNLOAD
Feb  9 00:19:09.226000 audit: BPF prog-id=87 op=UNLOAD
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { perfmon } for  pid=2882 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit[2882]: AVC avc:  denied  { bpf } for  pid=2882 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:09.226000 audit: BPF prog-id=89 op=LOAD
Feb  9 00:19:09.226000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1068 items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:09.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376438323164346165303264643362393130313633323637643338
Feb  9 00:19:09.312945 env[1312]: time="2024-02-09T00:19:09.312915413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\""
Feb  9 00:19:09.601479 kubelet[1870]: E0209 00:19:09.601342    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:09.934346 systemd[1]: run-containerd-runc-k8s.io-5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022-runc.gutqu1.mount: Deactivated successfully.
Feb  9 00:19:10.354705 systemd-networkd[1457]: cali47d1ac121ae: Gained IPv6LL
Feb  9 00:19:10.601929 kubelet[1870]: E0209 00:19:10.601872    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:10.833319 env[1312]: time="2024-02-09T00:19:10.833195134Z" level=info msg="StopPodSandbox for \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\""
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.872 [INFO][2925] k8s.go 578: Cleaning up netns ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.873 [INFO][2925] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" iface="eth0" netns="/var/run/netns/cni-da451568-95ad-43c5-658a-489fa81808b1"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.873 [INFO][2925] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" iface="eth0" netns="/var/run/netns/cni-da451568-95ad-43c5-658a-489fa81808b1"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.873 [INFO][2925] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" iface="eth0" netns="/var/run/netns/cni-da451568-95ad-43c5-658a-489fa81808b1"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.873 [INFO][2925] k8s.go 585: Releasing IP address(es) ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.873 [INFO][2925] utils.go 188: Calico CNI releasing IP address ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.891 [INFO][2931] ipam_plugin.go 415: Releasing address using handleID ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.891 [INFO][2931] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.891 [INFO][2931] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.898 [WARNING][2931] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.899 [INFO][2931] ipam_plugin.go 443: Releasing address using workloadID ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.900 [INFO][2931] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:10.902382 env[1312]: 2024-02-09 00:19:10.901 [INFO][2925] k8s.go 591: Teardown processing complete. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:10.906051 env[1312]: time="2024-02-09T00:19:10.905200307Z" level=info msg="TearDown network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\" successfully"
Feb  9 00:19:10.906051 env[1312]: time="2024-02-09T00:19:10.905239007Z" level=info msg="StopPodSandbox for \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\" returns successfully"
Feb  9 00:19:10.906051 env[1312]: time="2024-02-09T00:19:10.905990011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-hm47w,Uid:c9123bfb-8eb2-4219-92de-41d7ef8faa20,Namespace:default,Attempt:1,}"
Feb  9 00:19:10.904543 systemd[1]: run-netns-cni\x2dda451568\x2d95ad\x2d43c5\x2d658a\x2d489fa81808b1.mount: Deactivated successfully.
Feb  9 00:19:11.046950 systemd-networkd[1457]: calia185bcf735e: Link UP
Feb  9 00:19:11.056300 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 00:19:11.056536 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia185bcf735e: link becomes ready
Feb  9 00:19:11.057382 systemd-networkd[1457]: calia185bcf735e: Gained carrier
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:10.980 [INFO][2938] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0 nginx-deployment-8ffc5cf85- default  c9123bfb-8eb2-4219-92de-41d7ef8faa20 1369 0 2024-02-09 00:18:56 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.200.8.12  nginx-deployment-8ffc5cf85-hm47w eth0 default [] []   [kns.default ksa.default.default] calia185bcf735e  [] []}} ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hm47w" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:10.980 [INFO][2938] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hm47w" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.006 [INFO][2949] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" HandleID="k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.017 [INFO][2949] ipam_plugin.go 268: Auto assigning IP ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" HandleID="k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.12", "pod":"nginx-deployment-8ffc5cf85-hm47w", "timestamp":"2024-02-09 00:19:11.00650513 +0000 UTC"}, Hostname:"10.200.8.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.017 [INFO][2949] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.017 [INFO][2949] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.017 [INFO][2949] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.12'
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.018 [INFO][2949] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.022 [INFO][2949] ipam.go 372: Looking up existing affinities for host host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.027 [INFO][2949] ipam.go 489: Trying affinity for 192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.028 [INFO][2949] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.031 [INFO][2949] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.031 [INFO][2949] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.032 [INFO][2949] ipam.go 1682: Creating new handle: k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.035 [INFO][2949] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.039 [INFO][2949] ipam.go 1216: Successfully claimed IPs: [192.168.25.194/26] block=192.168.25.192/26 handle="k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.039 [INFO][2949] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.194/26] handle="k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" host="10.200.8.12"
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.039 [INFO][2949] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:11.064854 env[1312]: 2024-02-09 00:19:11.039 [INFO][2949] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.25.194/26] IPv6=[] ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" HandleID="k8s-pod-network.3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:11.065844 env[1312]: 2024-02-09 00:19:11.040 [INFO][2938] k8s.go 385: Populated endpoint ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hm47w" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"c9123bfb-8eb2-4219-92de-41d7ef8faa20", ResourceVersion:"1369", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 18, 56, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-hm47w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia185bcf735e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:11.065844 env[1312]: 2024-02-09 00:19:11.041 [INFO][2938] k8s.go 386: Calico CNI using IPs: [192.168.25.194/32] ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hm47w" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:11.065844 env[1312]: 2024-02-09 00:19:11.041 [INFO][2938] dataplane_linux.go 68: Setting the host side veth name to calia185bcf735e ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hm47w" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:11.065844 env[1312]: 2024-02-09 00:19:11.056 [INFO][2938] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hm47w" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:11.065844 env[1312]: 2024-02-09 00:19:11.057 [INFO][2938] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hm47w" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"c9123bfb-8eb2-4219-92de-41d7ef8faa20", ResourceVersion:"1369", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 18, 56, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851", Pod:"nginx-deployment-8ffc5cf85-hm47w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia185bcf735e", MAC:"9a:97:86:4f:f6:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:11.065844 env[1312]: 2024-02-09 00:19:11.063 [INFO][2938] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851" Namespace="default" Pod="nginx-deployment-8ffc5cf85-hm47w" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:11.082000 audit[2973]: NETFILTER_CFG table=filter:87 family=2 entries=40 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:19:11.082000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffe478e6980 a2=0 a3=7ffe478e696c items=0 ppid=2612 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:11.082000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:19:11.094220 env[1312]: time="2024-02-09T00:19:11.094062475Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 00:19:11.094220 env[1312]: time="2024-02-09T00:19:11.094092475Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 00:19:11.094220 env[1312]: time="2024-02-09T00:19:11.094101375Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 00:19:11.095226 env[1312]: time="2024-02-09T00:19:11.094251276Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851 pid=2982 runtime=io.containerd.runc.v2
Feb  9 00:19:11.117214 systemd[1]: Started cri-containerd-3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851.scope.
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.127000 audit: BPF prog-id=90 op=LOAD
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2982 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:11.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362666131616164393764343438643036653535326236653262333630
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2982 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:11.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362666131616164393764343438643036653535326236653262333630
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit: BPF prog-id=91 op=LOAD
Feb  9 00:19:11.128000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b4bb0 items=0 ppid=2982 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:11.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362666131616164393764343438643036653535326236653262333630
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.128000 audit: BPF prog-id=92 op=LOAD
Feb  9 00:19:11.128000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b4bf8 items=0 ppid=2982 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:11.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362666131616164393764343438643036653535326236653262333630
Feb  9 00:19:11.129000 audit: BPF prog-id=92 op=UNLOAD
Feb  9 00:19:11.129000 audit: BPF prog-id=91 op=UNLOAD
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { perfmon } for  pid=2990 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit[2990]: AVC avc:  denied  { bpf } for  pid=2990 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:11.129000 audit: BPF prog-id=93 op=LOAD
Feb  9 00:19:11.129000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b5008 items=0 ppid=2982 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:11.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362666131616164393764343438643036653535326236653262333630
Feb  9 00:19:11.165656 env[1312]: time="2024-02-09T00:19:11.165618039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-hm47w,Uid:c9123bfb-8eb2-4219-92de-41d7ef8faa20,Namespace:default,Attempt:1,} returns sandbox id \"3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851\""
Feb  9 00:19:11.602363 kubelet[1870]: E0209 00:19:11.602317    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:11.938441 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2047178185.mount: Deactivated successfully.
Feb  9 00:19:12.173214 env[1312]: time="2024-02-09T00:19:12.173165849Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:12.178800 env[1312]: time="2024-02-09T00:19:12.178761077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:12.181633 env[1312]: time="2024-02-09T00:19:12.181602591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:12.188212 env[1312]: time="2024-02-09T00:19:12.188121723Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:12.189391 env[1312]: time="2024-02-09T00:19:12.189050828Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\""
Feb  9 00:19:12.190603 env[1312]: time="2024-02-09T00:19:12.190575236Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Feb  9 00:19:12.191583 env[1312]: time="2024-02-09T00:19:12.191554541Z" level=info msg="CreateContainer within sandbox \"5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}"
Feb  9 00:19:12.217875 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4081366886.mount: Deactivated successfully.
Feb  9 00:19:12.230433 env[1312]: time="2024-02-09T00:19:12.230389335Z" level=info msg="CreateContainer within sandbox \"5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2b1ded34b035b2a5adccb4569f09bc4cc1d5df674994f15f317c8c5879621338\""
Feb  9 00:19:12.230886 env[1312]: time="2024-02-09T00:19:12.230852737Z" level=info msg="StartContainer for \"2b1ded34b035b2a5adccb4569f09bc4cc1d5df674994f15f317c8c5879621338\""
Feb  9 00:19:12.256705 systemd[1]: Started cri-containerd-2b1ded34b035b2a5adccb4569f09bc4cc1d5df674994f15f317c8c5879621338.scope.
Feb  9 00:19:12.271000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.271000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2871 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:12.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262316465643334623033356232613561646363623435363966303962
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit: BPF prog-id=94 op=LOAD
Feb  9 00:19:12.272000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00033e570 items=0 ppid=2871 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:12.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262316465643334623033356232613561646363623435363966303962
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit: BPF prog-id=95 op=LOAD
Feb  9 00:19:12.272000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00033e5b8 items=0 ppid=2871 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:12.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262316465643334623033356232613561646363623435363966303962
Feb  9 00:19:12.272000 audit: BPF prog-id=95 op=UNLOAD
Feb  9 00:19:12.272000 audit: BPF prog-id=94 op=UNLOAD
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { perfmon } for  pid=3025 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit[3025]: AVC avc:  denied  { bpf } for  pid=3025 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:12.272000 audit: BPF prog-id=96 op=LOAD
Feb  9 00:19:12.272000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00033e648 items=0 ppid=2871 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:12.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262316465643334623033356232613561646363623435363966303962
Feb  9 00:19:12.274660 systemd-networkd[1457]: calia185bcf735e: Gained IPv6LL
Feb  9 00:19:12.293988 env[1312]: time="2024-02-09T00:19:12.293954453Z" level=info msg="StartContainer for \"2b1ded34b035b2a5adccb4569f09bc4cc1d5df674994f15f317c8c5879621338\" returns successfully"
Feb  9 00:19:12.603617 kubelet[1870]: E0209 00:19:12.603463    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:12.939114 systemd[1]: run-containerd-runc-k8s.io-2b1ded34b035b2a5adccb4569f09bc4cc1d5df674994f15f317c8c5879621338-runc.vkF5sP.mount: Deactivated successfully.
Feb  9 00:19:13.604644 kubelet[1870]: E0209 00:19:13.604583    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:14.605497 kubelet[1870]: E0209 00:19:14.605427    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:15.545657 kubelet[1870]: E0209 00:19:15.545620    1870 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:15.606073 kubelet[1870]: E0209 00:19:15.606019    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:16.606924 kubelet[1870]: E0209 00:19:16.606867    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:16.921408 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount189717274.mount: Deactivated successfully.
Feb  9 00:19:17.608091 kubelet[1870]: E0209 00:19:17.608032    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:18.608351 kubelet[1870]: E0209 00:19:18.608303    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:19.236694 env[1312]: time="2024-02-09T00:19:19.236642070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:19.256194 env[1312]: time="2024-02-09T00:19:19.256152957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:19.274091 env[1312]: time="2024-02-09T00:19:19.273963737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:19.283396 env[1312]: time="2024-02-09T00:19:19.283361779Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:19.284045 env[1312]: time="2024-02-09T00:19:19.284016482Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\""
Feb  9 00:19:19.285455 env[1312]: time="2024-02-09T00:19:19.285424089Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\""
Feb  9 00:19:19.286293 env[1312]: time="2024-02-09T00:19:19.286257792Z" level=info msg="CreateContainer within sandbox \"3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851\" for container &ContainerMetadata{Name:nginx,Attempt:0,}"
Feb  9 00:19:19.320551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount630739692.mount: Deactivated successfully.
Feb  9 00:19:19.338750 env[1312]: time="2024-02-09T00:19:19.338708828Z" level=info msg="CreateContainer within sandbox \"3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f5bc60f16052ca430ef764d0873000eb303dd6d84bccd8d6a2e5f95114122daf\""
Feb  9 00:19:19.339290 env[1312]: time="2024-02-09T00:19:19.339259831Z" level=info msg="StartContainer for \"f5bc60f16052ca430ef764d0873000eb303dd6d84bccd8d6a2e5f95114122daf\""
Feb  9 00:19:19.360669 systemd[1]: Started cri-containerd-f5bc60f16052ca430ef764d0873000eb303dd6d84bccd8d6a2e5f95114122daf.scope.
Feb  9 00:19:19.379038 kernel: kauditd_printk_skb: 153 callbacks suppressed
Feb  9 00:19:19.379116 kernel: audit: type=1400 audit(1707437959.373:741): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.405722 kernel: audit: type=1400 audit(1707437959.373:742): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419059 kernel: audit: type=1400 audit(1707437959.373:743): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431742 kernel: audit: type=1400 audit(1707437959.373:744): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.445319 kernel: audit: type=1400 audit(1707437959.373:745): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.472923 kernel: audit: type=1400 audit(1707437959.373:746): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.473021 kernel: audit: type=1400 audit(1707437959.373:747): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.486100 kernel: audit: type=1400 audit(1707437959.373:748): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.373000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.378000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.511257 kernel: audit: type=1400 audit(1707437959.373:749): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.511341 kernel: audit: type=1400 audit(1707437959.378:750): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.378000 audit: BPF prog-id=97 op=LOAD
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2982 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:19.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626336306631363035326361343330656637363464303837333030
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2982 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:19.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626336306631363035326361343330656637363464303837333030
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.381000 audit: BPF prog-id=98 op=LOAD
Feb  9 00:19:19.381000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00034a090 items=0 ppid=2982 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:19.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626336306631363035326361343330656637363464303837333030
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.419000 audit: BPF prog-id=99 op=LOAD
Feb  9 00:19:19.419000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00034a0d8 items=0 ppid=2982 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626336306631363035326361343330656637363464303837333030
Feb  9 00:19:19.431000 audit: BPF prog-id=99 op=UNLOAD
Feb  9 00:19:19.431000 audit: BPF prog-id=98 op=UNLOAD
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { perfmon } for  pid=3070 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:19.431000 audit: BPF prog-id=100 op=LOAD
Feb  9 00:19:19.431000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00034a4e8 items=0 ppid=2982 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:19.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626336306631363035326361343330656637363464303837333030
Feb  9 00:19:19.539180 env[1312]: time="2024-02-09T00:19:19.539135628Z" level=info msg="StartContainer for \"f5bc60f16052ca430ef764d0873000eb303dd6d84bccd8d6a2e5f95114122daf\" returns successfully"
Feb  9 00:19:19.608746 kubelet[1870]: E0209 00:19:19.608706    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:20.008387 kubelet[1870]: I0209 00:19:20.008356    1870 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-hm47w" podStartSLOduration=-9.22337201284645e+09 pod.CreationTimestamp="2024-02-09 00:18:56 +0000 UTC" firstStartedPulling="2024-02-09 00:19:11.166931846 +0000 UTC m=+76.124595233" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:19:20.008116435 +0000 UTC m=+84.965779822" watchObservedRunningTime="2024-02-09 00:19:20.008324936 +0000 UTC m=+84.965988323"
Feb  9 00:19:20.314805 systemd[1]: run-containerd-runc-k8s.io-f5bc60f16052ca430ef764d0873000eb303dd6d84bccd8d6a2e5f95114122daf-runc.7pMCOU.mount: Deactivated successfully.
Feb  9 00:19:20.608960 kubelet[1870]: E0209 00:19:20.608828    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:21.609048 kubelet[1870]: E0209 00:19:21.608998    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:21.848513 env[1312]: time="2024-02-09T00:19:21.848457732Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:21.856778 env[1312]: time="2024-02-09T00:19:21.856733868Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:21.862448 env[1312]: time="2024-02-09T00:19:21.862350492Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:21.866128 env[1312]: time="2024-02-09T00:19:21.866097509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:21.866636 env[1312]: time="2024-02-09T00:19:21.866604311Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\""
Feb  9 00:19:21.868554 env[1312]: time="2024-02-09T00:19:21.868522519Z" level=info msg="CreateContainer within sandbox \"5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}"
Feb  9 00:19:21.907296 env[1312]: time="2024-02-09T00:19:21.907244688Z" level=info msg="CreateContainer within sandbox \"5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"332e087600f5f50b5e0ab5197bed2544782c6f360b448a40cbad91a7ed0dfb79\""
Feb  9 00:19:21.907761 env[1312]: time="2024-02-09T00:19:21.907718691Z" level=info msg="StartContainer for \"332e087600f5f50b5e0ab5197bed2544782c6f360b448a40cbad91a7ed0dfb79\""
Feb  9 00:19:21.936821 systemd[1]: run-containerd-runc-k8s.io-332e087600f5f50b5e0ab5197bed2544782c6f360b448a40cbad91a7ed0dfb79-runc.baoap9.mount: Deactivated successfully.
Feb  9 00:19:21.940145 systemd[1]: Started cri-containerd-332e087600f5f50b5e0ab5197bed2544782c6f360b448a40cbad91a7ed0dfb79.scope.
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2871 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:21.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326530383736303066356635306235653061623531393762656432
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.953000 audit: BPF prog-id=101 op=LOAD
Feb  9 00:19:21.953000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000299200 items=0 ppid=2871 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:21.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326530383736303066356635306235653061623531393762656432
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit: BPF prog-id=102 op=LOAD
Feb  9 00:19:21.954000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000299248 items=0 ppid=2871 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:21.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326530383736303066356635306235653061623531393762656432
Feb  9 00:19:21.954000 audit: BPF prog-id=102 op=UNLOAD
Feb  9 00:19:21.954000 audit: BPF prog-id=101 op=UNLOAD
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { perfmon } for  pid=3128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit[3128]: AVC avc:  denied  { bpf } for  pid=3128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:21.954000 audit: BPF prog-id=103 op=LOAD
Feb  9 00:19:21.954000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002992d8 items=0 ppid=2871 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:21.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326530383736303066356635306235653061623531393762656432
Feb  9 00:19:21.975332 env[1312]: time="2024-02-09T00:19:21.975292886Z" level=info msg="StartContainer for \"332e087600f5f50b5e0ab5197bed2544782c6f360b448a40cbad91a7ed0dfb79\" returns successfully"
Feb  9 00:19:22.023819 kubelet[1870]: I0209 00:19:22.023793    1870 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-76n98" podStartSLOduration=-9.22337196283101e+09 pod.CreationTimestamp="2024-02-09 00:18:08 +0000 UTC" firstStartedPulling="2024-02-09 00:19:09.31230131 +0000 UTC m=+74.269964697" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:19:22.022542691 +0000 UTC m=+86.980206178" watchObservedRunningTime="2024-02-09 00:19:22.023764496 +0000 UTC m=+86.981427983"
Feb  9 00:19:22.609722 kubelet[1870]: E0209 00:19:22.609647    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:22.692800 kubelet[1870]: I0209 00:19:22.692765    1870 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0
Feb  9 00:19:22.692800 kubelet[1870]: I0209 00:19:22.692807    1870 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock
Feb  9 00:19:23.610460 kubelet[1870]: E0209 00:19:23.610401    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:24.611327 kubelet[1870]: E0209 00:19:24.611268    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:25.611838 kubelet[1870]: E0209 00:19:25.611782    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:26.163771 kubelet[1870]: I0209 00:19:26.163592    1870 topology_manager.go:210] "Topology Admit Handler"
Feb  9 00:19:26.171845 kernel: kauditd_printk_skb: 90 callbacks suppressed
Feb  9 00:19:26.171956 kernel: audit: type=1325 audit(1707437966.162:765): table=filter:88 family=2 entries=18 op=nft_register_rule pid=3190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:26.162000 audit[3190]: NETFILTER_CFG table=filter:88 family=2 entries=18 op=nft_register_rule pid=3190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:26.180133 systemd[1]: Created slice kubepods-besteffort-pod218cca47_2b12_4969_a132_830e71c38b9a.slice.
Feb  9 00:19:26.162000 audit[3190]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fffa2051cf0 a2=0 a3=7fffa2051cdc items=0 ppid=2080 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.206517 kernel: audit: type=1300 audit(1707437966.162:765): arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fffa2051cf0 a2=0 a3=7fffa2051cdc items=0 ppid=2080 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.206605 kernel: audit: type=1327 audit(1707437966.162:765): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:26.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:26.213000 audit[3190]: NETFILTER_CFG table=nat:89 family=2 entries=94 op=nft_register_rule pid=3190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:26.213000 audit[3190]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7fffa2051cf0 a2=0 a3=7fffa2051cdc items=0 ppid=2080 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.249015 kernel: audit: type=1325 audit(1707437966.213:766): table=nat:89 family=2 entries=94 op=nft_register_rule pid=3190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:26.249108 kernel: audit: type=1300 audit(1707437966.213:766): arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7fffa2051cf0 a2=0 a3=7fffa2051cdc items=0 ppid=2080 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.249527 kubelet[1870]: I0209 00:19:26.249477    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/218cca47-2b12-4969-a132-830e71c38b9a-data\") pod \"nfs-server-provisioner-0\" (UID: \"218cca47-2b12-4969-a132-830e71c38b9a\") " pod="default/nfs-server-provisioner-0"
Feb  9 00:19:26.249644 kubelet[1870]: I0209 00:19:26.249560    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s6zzx\" (UniqueName: \"kubernetes.io/projected/218cca47-2b12-4969-a132-830e71c38b9a-kube-api-access-s6zzx\") pod \"nfs-server-provisioner-0\" (UID: \"218cca47-2b12-4969-a132-830e71c38b9a\") " pod="default/nfs-server-provisioner-0"
Feb  9 00:19:26.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:26.259000 audit[3219]: NETFILTER_CFG table=filter:90 family=2 entries=30 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:26.271275 kernel: audit: type=1327 audit(1707437966.213:766): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:26.271363 kernel: audit: type=1325 audit(1707437966.259:767): table=filter:90 family=2 entries=30 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:26.271399 kernel: audit: type=1300 audit(1707437966.259:767): arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd52d00300 a2=0 a3=7ffd52d002ec items=0 ppid=2080 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.259000 audit[3219]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd52d00300 a2=0 a3=7ffd52d002ec items=0 ppid=2080 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:26.293527 kernel: audit: type=1327 audit(1707437966.259:767): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:26.261000 audit[3219]: NETFILTER_CFG table=nat:91 family=2 entries=94 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:26.261000 audit[3219]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffd52d00300 a2=0 a3=7ffd52d002ec items=0 ppid=2080 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:26.313501 kernel: audit: type=1325 audit(1707437966.261:768): table=nat:91 family=2 entries=94 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:26.507414 env[1312]: time="2024-02-09T00:19:26.507279848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:218cca47-2b12-4969-a132-830e71c38b9a,Namespace:default,Attempt:0,}"
Feb  9 00:19:26.612495 kubelet[1870]: E0209 00:19:26.612438    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:26.708674 systemd-networkd[1457]: cali60e51b789ff: Link UP
Feb  9 00:19:26.720939 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 00:19:26.721041 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready
Feb  9 00:19:26.721830 systemd-networkd[1457]: cali60e51b789ff: Gained carrier
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.625 [INFO][3222] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.12-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default  218cca47-2b12-4969-a132-830e71c38b9a 1432 0 2024-02-09 00:19:26 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s  10.200.8.12  nfs-server-provisioner-0 eth0 nfs-server-provisioner [] []   [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff  [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.625 [INFO][3222] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.656 [INFO][3233] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" HandleID="k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Workload="10.200.8.12-k8s-nfs--server--provisioner--0-eth0"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.670 [INFO][3233] ipam_plugin.go 268: Auto assigning IP ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" HandleID="k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Workload="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d950), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.12", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 00:19:26.656027956 +0000 UTC"}, Hostname:"10.200.8.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.670 [INFO][3233] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.670 [INFO][3233] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.671 [INFO][3233] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.12'
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.673 [INFO][3233] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.680 [INFO][3233] ipam.go 372: Looking up existing affinities for host host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.684 [INFO][3233] ipam.go 489: Trying affinity for 192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.686 [INFO][3233] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.689 [INFO][3233] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.689 [INFO][3233] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.691 [INFO][3233] ipam.go 1682: Creating new handle: k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.694 [INFO][3233] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.699 [INFO][3233] ipam.go 1216: Successfully claimed IPs: [192.168.25.195/26] block=192.168.25.192/26 handle="k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.699 [INFO][3233] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.195/26] handle="k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" host="10.200.8.12"
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.699 [INFO][3233] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:26.731051 env[1312]: 2024-02-09 00:19:26.699 [INFO][3233] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.25.195/26] IPv6=[] ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" HandleID="k8s-pod-network.2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Workload="10.200.8.12-k8s-nfs--server--provisioner--0-eth0"
Feb  9 00:19:26.731984 env[1312]: 2024-02-09 00:19:26.700 [INFO][3222] k8s.go 385: Populated endpoint ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"218cca47-2b12-4969-a132-830e71c38b9a", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 19, 26, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:26.731984 env[1312]: 2024-02-09 00:19:26.700 [INFO][3222] k8s.go 386: Calico CNI using IPs: [192.168.25.195/32] ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0"
Feb  9 00:19:26.731984 env[1312]: 2024-02-09 00:19:26.700 [INFO][3222] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0"
Feb  9 00:19:26.731984 env[1312]: 2024-02-09 00:19:26.722 [INFO][3222] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0"
Feb  9 00:19:26.732273 env[1312]: 2024-02-09 00:19:26.722 [INFO][3222] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"218cca47-2b12-4969-a132-830e71c38b9a", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 19, 26, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:80:ad:82:06:21", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:26.732273 env[1312]: 2024-02-09 00:19:26.729 [INFO][3222] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0"
Feb  9 00:19:26.750000 audit[3256]: NETFILTER_CFG table=filter:92 family=2 entries=38 op=nft_register_chain pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:19:26.750000 audit[3256]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffc24226d70 a2=0 a3=7ffc24226d5c items=0 ppid=2612 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:19:26.756395 env[1312]: time="2024-02-09T00:19:26.756241665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 00:19:26.756395 env[1312]: time="2024-02-09T00:19:26.756286665Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 00:19:26.756395 env[1312]: time="2024-02-09T00:19:26.756301565Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 00:19:26.756678 env[1312]: time="2024-02-09T00:19:26.756639866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72 pid=3263 runtime=io.containerd.runc.v2
Feb  9 00:19:26.780168 systemd[1]: Started cri-containerd-2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72.scope.
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.792000 audit: BPF prog-id=104 op=LOAD
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=3263 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333064646235386534396430396361616331343732613932323536
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=c items=0 ppid=3263 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333064646235386534396430396361616331343732613932323536
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit: BPF prog-id=105 op=LOAD
Feb  9 00:19:26.793000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c000253420 items=0 ppid=3263 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333064646235386534396430396361616331343732613932323536
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit: BPF prog-id=106 op=LOAD
Feb  9 00:19:26.793000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c000253468 items=0 ppid=3263 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333064646235386534396430396361616331343732613932323536
Feb  9 00:19:26.793000 audit: BPF prog-id=106 op=UNLOAD
Feb  9 00:19:26.793000 audit: BPF prog-id=105 op=UNLOAD
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { perfmon } for  pid=3274 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit[3274]: AVC avc:  denied  { bpf } for  pid=3274 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:26.793000 audit: BPF prog-id=107 op=LOAD
Feb  9 00:19:26.793000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c000253878 items=0 ppid=3263 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:26.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333064646235386534396430396361616331343732613932323536
Feb  9 00:19:26.822757 env[1312]: time="2024-02-09T00:19:26.822717136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:218cca47-2b12-4969-a132-830e71c38b9a,Namespace:default,Attempt:0,} returns sandbox id \"2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72\""
Feb  9 00:19:26.824509 env[1312]: time="2024-02-09T00:19:26.824461643Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\""
Feb  9 00:19:27.367633 systemd[1]: run-containerd-runc-k8s.io-2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72-runc.fCiit6.mount: Deactivated successfully.
Feb  9 00:19:27.612753 kubelet[1870]: E0209 00:19:27.612711    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:27.826703 systemd-networkd[1457]: cali60e51b789ff: Gained IPv6LL
Feb  9 00:19:28.613653 kubelet[1870]: E0209 00:19:28.613591    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:29.614019 kubelet[1870]: E0209 00:19:29.613973    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:30.095734 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4293798260.mount: Deactivated successfully.
Feb  9 00:19:30.614455 kubelet[1870]: E0209 00:19:30.614396    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:31.615308 kubelet[1870]: E0209 00:19:31.615248    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:32.616354 kubelet[1870]: E0209 00:19:32.616293    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:32.806962 env[1312]: time="2024-02-09T00:19:32.806907807Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:32.814786 env[1312]: time="2024-02-09T00:19:32.814747437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:32.818469 env[1312]: time="2024-02-09T00:19:32.818439651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:32.825302 env[1312]: time="2024-02-09T00:19:32.825263477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:19:32.825989 env[1312]: time="2024-02-09T00:19:32.825958279Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\""
Feb  9 00:19:32.828399 env[1312]: time="2024-02-09T00:19:32.828369288Z" level=info msg="CreateContainer within sandbox \"2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}"
Feb  9 00:19:32.849900 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3923974573.mount: Deactivated successfully.
Feb  9 00:19:32.868332 env[1312]: time="2024-02-09T00:19:32.868241340Z" level=info msg="CreateContainer within sandbox \"2030ddb58e49d09caac1472a92256ec4a288eaee055439404d2aa08e72f39c72\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b66c1773ea3c3a15c3e4d748fcd03236212b129ff2e0b6acc0a6134653299706\""
Feb  9 00:19:32.869136 env[1312]: time="2024-02-09T00:19:32.869099543Z" level=info msg="StartContainer for \"b66c1773ea3c3a15c3e4d748fcd03236212b129ff2e0b6acc0a6134653299706\""
Feb  9 00:19:32.894003 systemd[1]: Started cri-containerd-b66c1773ea3c3a15c3e4d748fcd03236212b129ff2e0b6acc0a6134653299706.scope.
Feb  9 00:19:32.926601 kernel: kauditd_printk_skb: 62 callbacks suppressed
Feb  9 00:19:32.926723 kernel: audit: type=1400 audit(1707437972.908:788): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.940239 kernel: audit: type=1400 audit(1707437972.908:789): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.965502 kernel: audit: type=1400 audit(1707437972.908:790): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.965571 kernel: audit: type=1400 audit(1707437972.908:791): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.965604 kernel: audit: type=1400 audit(1707437972.908:792): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.990357 kernel: audit: type=1400 audit(1707437972.908:793): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.990622 kernel: audit: type=1400 audit(1707437972.908:794): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:33.034014 kernel: audit: type=1400 audit(1707437972.908:795): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:33.034101 kernel: audit: type=1400 audit(1707437972.908:796): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:33.047970 kernel: audit: type=1400 audit(1707437972.908:797): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.908000 audit: BPF prog-id=108 op=LOAD
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3263 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:32.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236366331373733656133633361313563336534643734386663643033
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3263 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:32.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236366331373733656133633361313563336534643734386663643033
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.912000 audit: BPF prog-id=109 op=LOAD
Feb  9 00:19:32.912000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000376a80 items=0 ppid=3263 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:32.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236366331373733656133633361313563336534643734386663643033
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit: BPF prog-id=110 op=LOAD
Feb  9 00:19:32.926000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000376ac8 items=0 ppid=3263 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:32.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236366331373733656133633361313563336534643734386663643033
Feb  9 00:19:32.926000 audit: BPF prog-id=110 op=UNLOAD
Feb  9 00:19:32.926000 audit: BPF prog-id=109 op=UNLOAD
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { perfmon } for  pid=3308 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit[3308]: AVC avc:  denied  { bpf } for  pid=3308 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:19:32.926000 audit: BPF prog-id=111 op=LOAD
Feb  9 00:19:32.926000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000376ed8 items=0 ppid=3263 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:32.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236366331373733656133633361313563336534643734386663643033
Feb  9 00:19:33.050290 env[1312]: time="2024-02-09T00:19:33.048397222Z" level=info msg="StartContainer for \"b66c1773ea3c3a15c3e4d748fcd03236212b129ff2e0b6acc0a6134653299706\" returns successfully"
Feb  9 00:19:33.058000 audit[3335]: AVC avc:  denied  { search } for  pid=3335 comm="rpcbind" name="crypto" dev="proc" ino=26943 scontext=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Feb  9 00:19:33.058000 audit[3335]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4e165f30c0 a2=0 a3=0 items=0 ppid=3318 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 key=(null)
Feb  9 00:19:33.058000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77
Feb  9 00:19:33.064085 kubelet[1870]: I0209 00:19:33.063720    1870 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.2233720297911e+09 pod.CreationTimestamp="2024-02-09 00:19:26 +0000 UTC" firstStartedPulling="2024-02-09 00:19:26.824006042 +0000 UTC m=+91.781669529" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:19:33.063096477 +0000 UTC m=+98.020759864" watchObservedRunningTime="2024-02-09 00:19:33.06367598 +0000 UTC m=+98.021339467"
Feb  9 00:19:33.094000 audit[3340]: AVC avc:  denied  { search } for  pid=3340 comm="dbus-daemon" name="crypto" dev="proc" ino=26943 scontext=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Feb  9 00:19:33.094000 audit[3340]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fba42ef60c0 a2=0 a3=0 items=0 ppid=3318 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 key=(null)
Feb  9 00:19:33.094000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Feb  9 00:19:33.098000 audit[3342]: AVC avc:  denied  { watch } for  pid=3342 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c551,c742 tclass=dir permissive=0
Feb  9 00:19:33.098000 audit[3342]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5562065e1970 a2=2c8 a3=7ffffb42b17c items=0 ppid=3318 pid=3342 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 key=(null)
Feb  9 00:19:33.098000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Feb  9 00:19:33.104000 audit[3344]: AVC avc:  denied  { read } for  pid=3344 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=27043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0
Feb  9 00:19:33.104000 audit[3344]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fb5d86f4320 a1=80000 a2=d a3=7fff70cf0860 items=0 ppid=3318 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 key=(null)
Feb  9 00:19:33.104000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Feb  9 00:19:33.106000 audit[3344]: AVC avc:  denied  { search } for  pid=3344 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26943 scontext=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Feb  9 00:19:33.106000 audit[3344]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb5d7c480c0 a2=0 a3=0 items=0 ppid=3318 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c551,c742 key=(null)
Feb  9 00:19:33.106000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Feb  9 00:19:33.138000 audit[3371]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=3371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:33.138000 audit[3371]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff3b9554d0 a2=0 a3=7fff3b9554bc items=0 ppid=2080 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:33.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:33.143000 audit[3371]: NETFILTER_CFG table=nat:94 family=2 entries=178 op=nft_register_chain pid=3371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Feb  9 00:19:33.143000 audit[3371]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7fff3b9554d0 a2=0 a3=7fff3b9554bc items=0 ppid=2080 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:33.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Feb  9 00:19:33.616786 kubelet[1870]: E0209 00:19:33.616665    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:33.846114 systemd[1]: run-containerd-runc-k8s.io-b66c1773ea3c3a15c3e4d748fcd03236212b129ff2e0b6acc0a6134653299706-runc.KxN4Yf.mount: Deactivated successfully.
Feb  9 00:19:34.617793 kubelet[1870]: E0209 00:19:34.617739    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:35.545209 kubelet[1870]: E0209 00:19:35.545149    1870 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:35.618755 kubelet[1870]: E0209 00:19:35.618702    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:36.619155 kubelet[1870]: E0209 00:19:36.619100    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:37.620309 kubelet[1870]: E0209 00:19:37.620251    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:38.620683 kubelet[1870]: E0209 00:19:38.620622    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:39.621623 kubelet[1870]: E0209 00:19:39.621569    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:40.622345 kubelet[1870]: E0209 00:19:40.622292    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:41.623190 kubelet[1870]: E0209 00:19:41.623134    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:42.623621 kubelet[1870]: E0209 00:19:42.623565    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:43.624657 kubelet[1870]: E0209 00:19:43.624599    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:44.625120 kubelet[1870]: E0209 00:19:44.625064    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:45.626062 kubelet[1870]: E0209 00:19:45.626000    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:46.626578 kubelet[1870]: E0209 00:19:46.626518    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:47.627443 kubelet[1870]: E0209 00:19:47.627390    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:48.627567 kubelet[1870]: E0209 00:19:48.627510    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:49.627948 kubelet[1870]: E0209 00:19:49.627881    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:50.628984 kubelet[1870]: E0209 00:19:50.628929    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:51.629619 kubelet[1870]: E0209 00:19:51.629568    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:52.630115 kubelet[1870]: E0209 00:19:52.630061    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:53.630635 kubelet[1870]: E0209 00:19:53.630575    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:54.631270 kubelet[1870]: E0209 00:19:54.631204    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:55.545695 kubelet[1870]: E0209 00:19:55.545635    1870 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:55.563676 env[1312]: time="2024-02-09T00:19:55.563632357Z" level=info msg="StopPodSandbox for \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\""
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.598 [WARNING][3441] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-csi--node--driver--76n98-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7", ResourceVersion:"1403", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 18, 8, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022", Pod:"csi-node-driver-76n98", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali47d1ac121ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.599 [INFO][3441] k8s.go 578: Cleaning up netns ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.599 [INFO][3441] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" iface="eth0" netns=""
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.599 [INFO][3441] k8s.go 585: Releasing IP address(es) ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.599 [INFO][3441] utils.go 188: Calico CNI releasing IP address ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.617 [INFO][3447] ipam_plugin.go 415: Releasing address using handleID ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.617 [INFO][3447] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.617 [INFO][3447] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.625 [WARNING][3447] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.625 [INFO][3447] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.627 [INFO][3447] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:55.629372 env[1312]: 2024-02-09 00:19:55.628 [INFO][3441] k8s.go 591: Teardown processing complete. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:55.630063 env[1312]: time="2024-02-09T00:19:55.629368460Z" level=info msg="TearDown network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\" successfully"
Feb  9 00:19:55.630063 env[1312]: time="2024-02-09T00:19:55.629408660Z" level=info msg="StopPodSandbox for \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\" returns successfully"
Feb  9 00:19:55.630156 env[1312]: time="2024-02-09T00:19:55.630093962Z" level=info msg="RemovePodSandbox for \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\""
Feb  9 00:19:55.630201 env[1312]: time="2024-02-09T00:19:55.630149362Z" level=info msg="Forcibly stopping sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\""
Feb  9 00:19:55.631543 kubelet[1870]: E0209 00:19:55.631509    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.667 [WARNING][3465] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-csi--node--driver--76n98-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"155d0c6d-0e58-4536-8ce2-58eb7a4d42f7", ResourceVersion:"1403", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 18, 8, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"5f7d821d4ae02dd3b910163267d3812942d29ea9ba555b73a6e5dbbf50287022", Pod:"csi-node-driver-76n98", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali47d1ac121ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.667 [INFO][3465] k8s.go 578: Cleaning up netns ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.667 [INFO][3465] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" iface="eth0" netns=""
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.667 [INFO][3465] k8s.go 585: Releasing IP address(es) ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.667 [INFO][3465] utils.go 188: Calico CNI releasing IP address ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.685 [INFO][3471] ipam_plugin.go 415: Releasing address using handleID ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.685 [INFO][3471] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.685 [INFO][3471] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.693 [WARNING][3471] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.693 [INFO][3471] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" HandleID="k8s-pod-network.0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d" Workload="10.200.8.12-k8s-csi--node--driver--76n98-eth0"
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.695 [INFO][3471] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:55.697611 env[1312]: 2024-02-09 00:19:55.696 [INFO][3465] k8s.go 591: Teardown processing complete. ContainerID="0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d"
Feb  9 00:19:55.698352 env[1312]: time="2024-02-09T00:19:55.697637271Z" level=info msg="TearDown network for sandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\" successfully"
Feb  9 00:19:55.704516 env[1312]: time="2024-02-09T00:19:55.704466893Z" level=info msg="RemovePodSandbox \"0049605cac4de2370ad53597a71760524fe27210876e6f776a5e0f71bb299a7d\" returns successfully"
Feb  9 00:19:55.705038 env[1312]: time="2024-02-09T00:19:55.705006194Z" level=info msg="StopPodSandbox for \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\""
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.748 [WARNING][3490] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"c9123bfb-8eb2-4219-92de-41d7ef8faa20", ResourceVersion:"1396", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 18, 56, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851", Pod:"nginx-deployment-8ffc5cf85-hm47w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia185bcf735e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.748 [INFO][3490] k8s.go 578: Cleaning up netns ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.748 [INFO][3490] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" iface="eth0" netns=""
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.748 [INFO][3490] k8s.go 585: Releasing IP address(es) ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.748 [INFO][3490] utils.go 188: Calico CNI releasing IP address ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.764 [INFO][3498] ipam_plugin.go 415: Releasing address using handleID ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.764 [INFO][3498] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.764 [INFO][3498] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.773 [WARNING][3498] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.773 [INFO][3498] ipam_plugin.go 443: Releasing address using workloadID ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.775 [INFO][3498] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:55.776977 env[1312]: 2024-02-09 00:19:55.776 [INFO][3490] k8s.go 591: Teardown processing complete. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:55.777661 env[1312]: time="2024-02-09T00:19:55.777061417Z" level=info msg="TearDown network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\" successfully"
Feb  9 00:19:55.777661 env[1312]: time="2024-02-09T00:19:55.777103317Z" level=info msg="StopPodSandbox for \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\" returns successfully"
Feb  9 00:19:55.778057 env[1312]: time="2024-02-09T00:19:55.778020120Z" level=info msg="RemovePodSandbox for \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\""
Feb  9 00:19:55.778159 env[1312]: time="2024-02-09T00:19:55.778079120Z" level=info msg="Forcibly stopping sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\""
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.812 [WARNING][3516] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"c9123bfb-8eb2-4219-92de-41d7ef8faa20", ResourceVersion:"1396", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 18, 56, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"3bfa1aad97d448d06e552b6e2b360e586bbf693dcfa8bc1107bd908a244db851", Pod:"nginx-deployment-8ffc5cf85-hm47w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia185bcf735e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.812 [INFO][3516] k8s.go 578: Cleaning up netns ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.812 [INFO][3516] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" iface="eth0" netns=""
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.812 [INFO][3516] k8s.go 585: Releasing IP address(es) ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.812 [INFO][3516] utils.go 188: Calico CNI releasing IP address ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.829 [INFO][3523] ipam_plugin.go 415: Releasing address using handleID ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.829 [INFO][3523] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.829 [INFO][3523] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.836 [WARNING][3523] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.837 [INFO][3523] ipam_plugin.go 443: Releasing address using workloadID ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" HandleID="k8s-pod-network.41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3" Workload="10.200.8.12-k8s-nginx--deployment--8ffc5cf85--hm47w-eth0"
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.838 [INFO][3523] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:19:55.842009 env[1312]: 2024-02-09 00:19:55.839 [INFO][3516] k8s.go 591: Teardown processing complete. ContainerID="41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3"
Feb  9 00:19:55.842009 env[1312]: time="2024-02-09T00:19:55.840302913Z" level=info msg="TearDown network for sandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\" successfully"
Feb  9 00:19:55.848326 env[1312]: time="2024-02-09T00:19:55.848285338Z" level=info msg="RemovePodSandbox \"41dc05bca79832d0c29e35458152aa767957260fb2b3b2549f7abf493f5099c3\" returns successfully"
Feb  9 00:19:56.631945 kubelet[1870]: E0209 00:19:56.631889    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:57.572853 kubelet[1870]: I0209 00:19:57.572806    1870 topology_manager.go:210] "Topology Admit Handler"
Feb  9 00:19:57.578821 systemd[1]: Created slice kubepods-besteffort-poda422601e_9439_4178_b7b9_807ac7c60ce3.slice.
Feb  9 00:19:57.632407 kubelet[1870]: E0209 00:19:57.632378    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:57.709736 kubelet[1870]: I0209 00:19:57.709687    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-2e4ce183-8f16-47c7-9bfe-ce0599fce74b\" (UniqueName: \"kubernetes.io/nfs/a422601e-9439-4178-b7b9-807ac7c60ce3-pvc-2e4ce183-8f16-47c7-9bfe-ce0599fce74b\") pod \"test-pod-1\" (UID: \"a422601e-9439-4178-b7b9-807ac7c60ce3\") " pod="default/test-pod-1"
Feb  9 00:19:57.709929 kubelet[1870]: I0209 00:19:57.709755    1870 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-phzgc\" (UniqueName: \"kubernetes.io/projected/a422601e-9439-4178-b7b9-807ac7c60ce3-kube-api-access-phzgc\") pod \"test-pod-1\" (UID: \"a422601e-9439-4178-b7b9-807ac7c60ce3\") " pod="default/test-pod-1"
Feb  9 00:19:57.933930 kernel: Failed to create system directory netfs
Feb  9 00:19:57.934064 kernel: kauditd_printk_skb: 68 callbacks suppressed
Feb  9 00:19:57.934089 kernel: audit: type=1400 audit(1707437997.923:813): avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:57.934115 kernel: Failed to create system directory netfs
Feb  9 00:19:57.923000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:57.954261 kernel: audit: type=1400 audit(1707437997.923:813): avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:57.954343 kernel: Failed to create system directory netfs
Feb  9 00:19:57.923000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:57.973855 kernel: audit: type=1400 audit(1707437997.923:813): avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:57.973926 kernel: Failed to create system directory netfs
Feb  9 00:19:57.923000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.009619 kernel: audit: type=1400 audit(1707437997.923:813): avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:57.923000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:57.923000 audit[3535]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5652f97d45e0 a1=153bc a2=5652f8d4d2b0 a3=5 items=0 ppid=50 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:57.923000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 00:19:58.035256 kernel: audit: type=1300 audit(1707437997.923:813): arch=c000003e syscall=175 success=yes exit=0 a0=5652f97d45e0 a1=153bc a2=5652f8d4d2b0 a3=5 items=0 ppid=50 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:58.035345 kernel: audit: type=1327 audit(1707437997.923:813): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.077996 kernel: Failed to create system directory fscache
Feb  9 00:19:58.078071 kernel: audit: type=1400 audit(1707437998.050:814): avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.078095 kernel: Failed to create system directory fscache
Feb  9 00:19:58.078113 kernel: audit: type=1400 audit(1707437998.050:814): avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.097550 kernel: Failed to create system directory fscache
Feb  9 00:19:58.097626 kernel: audit: type=1400 audit(1707437998.050:814): avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.118367 kernel: Failed to create system directory fscache
Feb  9 00:19:58.119539 kernel: audit: type=1400 audit(1707437998.050:814): avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.135506 kernel: Failed to create system directory fscache
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.142674 kernel: Failed to create system directory fscache
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.146292 kernel: Failed to create system directory fscache
Feb  9 00:19:58.146351 kernel: Failed to create system directory fscache
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.153553 kernel: Failed to create system directory fscache
Feb  9 00:19:58.153609 kernel: Failed to create system directory fscache
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.160399 kernel: Failed to create system directory fscache
Feb  9 00:19:58.160459 kernel: Failed to create system directory fscache
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.167329 kernel: Failed to create system directory fscache
Feb  9 00:19:58.167393 kernel: Failed to create system directory fscache
Feb  9 00:19:58.050000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.050000 audit[3535]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5652f99e99c0 a1=4c0fc a2=5652f8d4d2b0 a3=5 items=0 ppid=50 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:58.050000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 00:19:58.175512 kernel: FS-Cache: Loaded
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.313945 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.314058 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.319749 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.319823 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.326411 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.326497 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.332831 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.332894 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.339173 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.339233 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.345387 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.345445 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.351716 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.351784 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.357694 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.357765 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.363869 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.363938 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.367564 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.372859 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.372923 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.378693 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.378752 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.384569 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.384633 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.390301 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.390351 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.396125 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.396189 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.401577 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.401638 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.407196 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.410267 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.410335 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.415692 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.415757 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.421898 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.421968 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.427258 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.427317 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.432283 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.432341 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.437468 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.437542 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.442778 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.442837 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.448053 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.448112 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.453235 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.453298 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.458552 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.458602 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.463828 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.463886 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.469095 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.469162 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.473080 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.476505 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.481196 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.481248 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.486545 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.486605 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.491797 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.491856 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.496852 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.496917 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.502145 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.502203 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.507493 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.507555 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.512715 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.512772 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.518186 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.518254 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.523414 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.523474 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.528954 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.529003 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.534335 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.534385 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.539581 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.539633 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.542474 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.547575 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.547636 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.552916 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.552977 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.558294 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.558357 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.563596 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.563636 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.569643 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.569713 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.574976 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.575027 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.580334 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.586139 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.586193 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.588968 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.589019 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.594132 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.594179 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.599492 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.599549 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.604730 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.604778 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.609942 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.609982 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.613539 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.617994 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.618041 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.620676 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.626084 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.626129 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.631890 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.631947 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.632972 kubelet[1870]: E0209 00:19:58.632932    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.637415 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.637470 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.642704 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.645518 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.645565 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.648075 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.650733 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.653339 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.656087 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.658634 kernel: Failed to create system directory sunrpc
Feb  9 00:19:58.296000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.673733 kernel: RPC: Registered named UNIX socket transport module.
Feb  9 00:19:58.673807 kernel: RPC: Registered udp transport module.
Feb  9 00:19:58.673834 kernel: RPC: Registered tcp transport module.
Feb  9 00:19:58.676509 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module.
Feb  9 00:19:58.296000 audit[3535]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5652f9a35ad0 a1=1588c4 a2=5652f8d4d2b0 a3=5 items=6 ppid=50 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:58.296000 audit: CWD cwd="/"
Feb  9 00:19:58.296000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:58.296000 audit: PATH item=1 name=(null) inode=27502 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:58.296000 audit: PATH item=2 name=(null) inode=27502 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:58.296000 audit: PATH item=3 name=(null) inode=27503 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:58.296000 audit: PATH item=4 name=(null) inode=27502 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:58.296000 audit: PATH item=5 name=(null) inode=27504 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 00:19:58.296000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.883432 kernel: Failed to create system directory nfs
Feb  9 00:19:58.883531 kernel: Failed to create system directory nfs
Feb  9 00:19:58.883556 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.888501 kernel: Failed to create system directory nfs
Feb  9 00:19:58.888571 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.893592 kernel: Failed to create system directory nfs
Feb  9 00:19:58.893664 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.899326 kernel: Failed to create system directory nfs
Feb  9 00:19:58.899395 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.904566 kernel: Failed to create system directory nfs
Feb  9 00:19:58.904615 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.909537 kernel: Failed to create system directory nfs
Feb  9 00:19:58.909599 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.914879 kernel: Failed to create system directory nfs
Feb  9 00:19:58.914941 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.917474 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.922533 kernel: Failed to create system directory nfs
Feb  9 00:19:58.922593 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.927490 kernel: Failed to create system directory nfs
Feb  9 00:19:58.927550 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.935612 kernel: Failed to create system directory nfs
Feb  9 00:19:58.935668 kernel: Failed to create system directory nfs
Feb  9 00:19:58.935694 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.938182 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.943413 kernel: Failed to create system directory nfs
Feb  9 00:19:58.943463 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.948644 kernel: Failed to create system directory nfs
Feb  9 00:19:58.948697 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.953731 kernel: Failed to create system directory nfs
Feb  9 00:19:58.953783 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.958731 kernel: Failed to create system directory nfs
Feb  9 00:19:58.958781 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.963825 kernel: Failed to create system directory nfs
Feb  9 00:19:58.963872 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.968885 kernel: Failed to create system directory nfs
Feb  9 00:19:58.968925 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.973966 kernel: Failed to create system directory nfs
Feb  9 00:19:58.974017 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.979617 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.982509 kernel: Failed to create system directory nfs
Feb  9 00:19:58.982565 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.988145 kernel: Failed to create system directory nfs
Feb  9 00:19:58.988200 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.993297 kernel: Failed to create system directory nfs
Feb  9 00:19:58.993345 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.998267 kernel: Failed to create system directory nfs
Feb  9 00:19:58.998306 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.003586 kernel: Failed to create system directory nfs
Feb  9 00:19:59.003655 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.008696 kernel: Failed to create system directory nfs
Feb  9 00:19:59.008761 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.013654 kernel: Failed to create system directory nfs
Feb  9 00:19:59.013717 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.018726 kernel: Failed to create system directory nfs
Feb  9 00:19:59.018789 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.023997 kernel: Failed to create system directory nfs
Feb  9 00:19:59.024064 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.028992 kernel: Failed to create system directory nfs
Feb  9 00:19:59.029056 kernel: Failed to create system directory nfs
Feb  9 00:19:58.869000 audit[3535]: AVC avc:  denied  { confidentiality } for  pid=3535 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:58.869000 audit[3535]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5652f9bd8680 a1=e29dc a2=5652f8d4d2b0 a3=5 items=0 ppid=50 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:59.046742 kernel: FS-Cache: Netfs 'nfs' registered for caching
Feb  9 00:19:58.869000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.137375 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.137456 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.137500 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.142657 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.142712 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.148039 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.148105 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.153400 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.153531 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.158741 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.158806 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.163944 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.164005 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.169241 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.169296 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.174406 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.174444 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.179555 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.179610 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.184900 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.185523 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.188544 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.193156 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.193205 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.198548 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.198587 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.203725 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.203772 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.208903 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.208969 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.214183 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.214231 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.219209 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.219250 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.221837 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.224328 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.226924 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.232506 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.235469 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.235530 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.240701 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.240758 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.246178 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.246246 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.251365 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.251403 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.256598 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.256637 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.261816 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.261865 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.266985 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.267031 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.272040 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.272080 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.275505 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.279972 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.280009 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.284949 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.284996 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.290053 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.290102 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.295490 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.295542 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.300811 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.300862 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.305904 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.305955 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.311543 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.311590 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.316533 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.316579 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.321713 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.321752 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.326783 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.326844 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.331664 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.331727 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.336718 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.336778 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.342519 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.347697 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.347779 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.347805 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.352806 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.352861 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.358034 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.358095 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.363081 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.363116 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.368191 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.368231 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.373437 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.373500 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.117000 audit[3540]: AVC avc:  denied  { confidentiality } for  pid=3540 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.378497 kernel: Failed to create system directory nfs4
Feb  9 00:19:59.521113 kernel: NFS: Registering the id_resolver key type
Feb  9 00:19:59.521238 kernel: Key type id_resolver registered
Feb  9 00:19:59.521284 kernel: Key type id_legacy registered
Feb  9 00:19:59.117000 audit[3540]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fcb0a50e010 a1=1d3cc4 a2=55d19402d2b0 a3=5 items=0 ppid=50 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:59.117000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.573014 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.573065 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.573083 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.578731 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.578779 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.583960 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.584007 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.586824 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.592056 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.592107 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.597277 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.597317 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.602608 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.602647 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.607982 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.608032 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.610794 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.613377 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.618648 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.619537 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.622539 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.627547 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.627600 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.630423 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.633116 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.633157 kubelet[1870]: E0209 00:19:59.633075    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.635817 kernel: Failed to create system directory rpcgss
Feb  9 00:19:59.563000 audit[3541]: AVC avc:  denied  { confidentiality } for  pid=3541 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Feb  9 00:19:59.563000 audit[3541]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fdd3e005010 a1=4f524 a2=5646fc6862b0 a3=5 items=0 ppid=50 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:59.563000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36
Feb  9 00:19:59.901613 nfsidmap[3547]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-f6a0525c7f'
Feb  9 00:19:59.908913 nfsidmap[3548]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-f6a0525c7f'
Feb  9 00:19:59.920000 audit[1416]: AVC avc:  denied  { watch_reads } for  pid=1416 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 00:19:59.920000 audit[1416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562cf74489c0 a2=10 a3=e2b3ae10e2ed13a2 items=0 ppid=1 pid=1416 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:59.920000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Feb  9 00:19:59.920000 audit[1416]: AVC avc:  denied  { watch_reads } for  pid=1416 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 00:19:59.920000 audit[1416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562cf74489c0 a2=10 a3=e2b3ae10e2ed13a2 items=0 ppid=1 pid=1416 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:59.920000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Feb  9 00:19:59.920000 audit[1416]: AVC avc:  denied  { watch_reads } for  pid=1416 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 00:19:59.920000 audit[1416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562cf74489c0 a2=10 a3=e2b3ae10e2ed13a2 items=0 ppid=1 pid=1416 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:19:59.920000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Feb  9 00:19:59.921000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 00:19:59.921000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 00:19:59.921000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Feb  9 00:19:59.982163 env[1312]: time="2024-02-09T00:19:59.982121539Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a422601e-9439-4178-b7b9-807ac7c60ce3,Namespace:default,Attempt:0,}"
Feb  9 00:20:00.126727 systemd-networkd[1457]: cali5ec59c6bf6e: Link UP
Feb  9 00:20:00.135203 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 00:20:00.135296 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready
Feb  9 00:20:00.136122 systemd-networkd[1457]: cali5ec59c6bf6e: Gained carrier
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.062 [INFO][3550] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.12-k8s-test--pod--1-eth0  default  a422601e-9439-4178-b7b9-807ac7c60ce3 1535 0 2024-02-09 00:19:27 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.200.8.12  test-pod-1 eth0 default [] []   [kns.default ksa.default.default] cali5ec59c6bf6e  [] []}} ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.062 [INFO][3550] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.085 [INFO][3561] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" HandleID="k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Workload="10.200.8.12-k8s-test--pod--1-eth0"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.096 [INFO][3561] ipam_plugin.go 268: Auto assigning IP ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" HandleID="k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Workload="10.200.8.12-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002af7b0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.12", "pod":"test-pod-1", "timestamp":"2024-02-09 00:20:00.085494449 +0000 UTC"}, Hostname:"10.200.8.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.096 [INFO][3561] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.096 [INFO][3561] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.096 [INFO][3561] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.12'
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.098 [INFO][3561] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.102 [INFO][3561] ipam.go 372: Looking up existing affinities for host host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.106 [INFO][3561] ipam.go 489: Trying affinity for 192.168.25.192/26 host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.107 [INFO][3561] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.109 [INFO][3561] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.109 [INFO][3561] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.111 [INFO][3561] ipam.go 1682: Creating new handle: k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.114 [INFO][3561] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.121 [INFO][3561] ipam.go 1216: Successfully claimed IPs: [192.168.25.196/26] block=192.168.25.192/26 handle="k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.121 [INFO][3561] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.196/26] handle="k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" host="10.200.8.12"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.121 [INFO][3561] ipam_plugin.go 377: Released host-wide IPAM lock.
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.121 [INFO][3561] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.25.196/26] IPv6=[] ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" HandleID="k8s-pod-network.0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Workload="10.200.8.12-k8s-test--pod--1-eth0"
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.122 [INFO][3550] k8s.go 385: Populated endpoint ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a422601e-9439-4178-b7b9-807ac7c60ce3", ResourceVersion:"1535", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 19, 27, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:20:00.144392 env[1312]: 2024-02-09 00:20:00.123 [INFO][3550] k8s.go 386: Calico CNI using IPs: [192.168.25.196/32] ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0"
Feb  9 00:20:00.145445 env[1312]: 2024-02-09 00:20:00.123 [INFO][3550] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0"
Feb  9 00:20:00.145445 env[1312]: 2024-02-09 00:20:00.136 [INFO][3550] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0"
Feb  9 00:20:00.145445 env[1312]: 2024-02-09 00:20:00.137 [INFO][3550] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a422601e-9439-4178-b7b9-807ac7c60ce3", ResourceVersion:"1535", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 19, 27, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1e:28:55:7b:bd:21", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Feb  9 00:20:00.145445 env[1312]: 2024-02-09 00:20:00.143 [INFO][3550] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0"
Feb  9 00:20:00.167746 env[1312]: time="2024-02-09T00:20:00.166116991Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 00:20:00.167941 env[1312]: time="2024-02-09T00:20:00.167906896Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 00:20:00.168062 env[1312]: time="2024-02-09T00:20:00.168037897Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 00:20:00.168290 env[1312]: time="2024-02-09T00:20:00.168260597Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d pid=3586 runtime=io.containerd.runc.v2
Feb  9 00:20:00.189000 audit[3603]: NETFILTER_CFG table=filter:95 family=2 entries=38 op=nft_register_chain pid=3603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Feb  9 00:20:00.189000 audit[3603]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7ffc3a2b7b30 a2=0 a3=7ffc3a2b7b1c items=0 ppid=2612 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.189000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Feb  9 00:20:00.195035 systemd[1]: Started cri-containerd-0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d.scope.
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.208000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit: BPF prog-id=112 op=LOAD
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396139636165663639646365356562613462383532653735343737
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396139636165663639646365356562613462383532653735343737
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit: BPF prog-id=113 op=LOAD
Feb  9 00:20:00.209000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025550 items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396139636165663639646365356562613462383532653735343737
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.209000 audit: BPF prog-id=114 op=LOAD
Feb  9 00:20:00.209000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025598 items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396139636165663639646365356562613462383532653735343737
Feb  9 00:20:00.210000 audit: BPF prog-id=114 op=UNLOAD
Feb  9 00:20:00.210000 audit: BPF prog-id=113 op=UNLOAD
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { perfmon } for  pid=3596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit[3596]: AVC avc:  denied  { bpf } for  pid=3596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.210000 audit: BPF prog-id=115 op=LOAD
Feb  9 00:20:00.210000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000259a8 items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396139636165663639646365356562613462383532653735343737
Feb  9 00:20:00.240911 env[1312]: time="2024-02-09T00:20:00.240876815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a422601e-9439-4178-b7b9-807ac7c60ce3,Namespace:default,Attempt:0,} returns sandbox id \"0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d\""
Feb  9 00:20:00.242529 env[1312]: time="2024-02-09T00:20:00.242461420Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Feb  9 00:20:00.634217 kubelet[1870]: E0209 00:20:00.634181    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:00.804705 env[1312]: time="2024-02-09T00:20:00.804642506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:20:00.810530 env[1312]: time="2024-02-09T00:20:00.810468824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:20:00.814572 env[1312]: time="2024-02-09T00:20:00.814539936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:20:00.818731 env[1312]: time="2024-02-09T00:20:00.818696049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 00:20:00.819318 env[1312]: time="2024-02-09T00:20:00.819287550Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\""
Feb  9 00:20:00.821238 env[1312]: time="2024-02-09T00:20:00.821204356Z" level=info msg="CreateContainer within sandbox \"0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d\" for container &ContainerMetadata{Name:test,Attempt:0,}"
Feb  9 00:20:00.855551 env[1312]: time="2024-02-09T00:20:00.855499659Z" level=info msg="CreateContainer within sandbox \"0b9a9caef69dce5eba4b852e75477f33159a8a2d285e3fb5ae2dd9c395b7d58d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"8926f26e1f72d045a1e29412a22b585979a9b0f7a869c638946b4793a2cf6e07\""
Feb  9 00:20:00.856014 env[1312]: time="2024-02-09T00:20:00.855983860Z" level=info msg="StartContainer for \"8926f26e1f72d045a1e29412a22b585979a9b0f7a869c638946b4793a2cf6e07\""
Feb  9 00:20:00.872842 systemd[1]: Started cri-containerd-8926f26e1f72d045a1e29412a22b585979a9b0f7a869c638946b4793a2cf6e07.scope.
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.886000 audit: BPF prog-id=116 op=LOAD
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323666323665316637326430343561316532393431326132326235
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323666323665316637326430343561316532393431326132326235
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.887000 audit: BPF prog-id=117 op=LOAD
Feb  9 00:20:00.887000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003440a0 items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323666323665316637326430343561316532393431326132326235
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit: BPF prog-id=118 op=LOAD
Feb  9 00:20:00.888000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003440e8 items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323666323665316637326430343561316532393431326132326235
Feb  9 00:20:00.888000 audit: BPF prog-id=118 op=UNLOAD
Feb  9 00:20:00.888000 audit: BPF prog-id=117 op=UNLOAD
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { perfmon } for  pid=3628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit[3628]: AVC avc:  denied  { bpf } for  pid=3628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 00:20:00.888000 audit: BPF prog-id=119 op=LOAD
Feb  9 00:20:00.888000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003444f8 items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 00:20:00.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323666323665316637326430343561316532393431326132326235
Feb  9 00:20:00.908627 env[1312]: time="2024-02-09T00:20:00.908586718Z" level=info msg="StartContainer for \"8926f26e1f72d045a1e29412a22b585979a9b0f7a869c638946b4793a2cf6e07\" returns successfully"
Feb  9 00:20:01.129960 kubelet[1870]: I0209 00:20:01.129928    1870 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.223372002724876e+09 pod.CreationTimestamp="2024-02-09 00:19:27 +0000 UTC" firstStartedPulling="2024-02-09 00:20:00.242000619 +0000 UTC m=+125.199664006" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:20:01.129619779 +0000 UTC m=+126.087283166" watchObservedRunningTime="2024-02-09 00:20:01.12990008 +0000 UTC m=+126.087563567"
Feb  9 00:20:01.426868 systemd-networkd[1457]: cali5ec59c6bf6e: Gained IPv6LL
Feb  9 00:20:01.635267 kubelet[1870]: E0209 00:20:01.635205    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:02.635902 kubelet[1870]: E0209 00:20:02.635842    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:03.347064 systemd[1]: run-containerd-runc-k8s.io-fc38d8d06ee635614014c8e1b630b9fc41182c5a5d5e6c5ae1816fca25e5f6de-runc.7aq1Ea.mount: Deactivated successfully.
Feb  9 00:20:03.636083 kubelet[1870]: E0209 00:20:03.636014    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:04.636356 kubelet[1870]: E0209 00:20:04.636297    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:05.637393 kubelet[1870]: E0209 00:20:05.637333    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:06.637862 kubelet[1870]: E0209 00:20:06.637802    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:07.638465 kubelet[1870]: E0209 00:20:07.638424    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:08.639428 kubelet[1870]: E0209 00:20:08.639372    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:09.640082 kubelet[1870]: E0209 00:20:09.640028    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:10.641319 kubelet[1870]: E0209 00:20:10.641224    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:11.642414 kubelet[1870]: E0209 00:20:11.642359    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:12.642661 kubelet[1870]: E0209 00:20:12.642600    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:13.643694 kubelet[1870]: E0209 00:20:13.643637    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:14.644611 kubelet[1870]: E0209 00:20:14.644552    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:15.545637 kubelet[1870]: E0209 00:20:15.545575    1870 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:15.645430 kubelet[1870]: E0209 00:20:15.645373    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:16.646514 kubelet[1870]: E0209 00:20:16.646390    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:17.647478 kubelet[1870]: E0209 00:20:17.647419    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:18.648257 kubelet[1870]: E0209 00:20:18.648213    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:19.648540 kubelet[1870]: E0209 00:20:19.648478    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:20.648829 kubelet[1870]: E0209 00:20:20.648740    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:21.649007 kubelet[1870]: E0209 00:20:21.648950    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:22.649918 kubelet[1870]: E0209 00:20:22.649847    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:23.650262 kubelet[1870]: E0209 00:20:23.650202    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:24.650596 kubelet[1870]: E0209 00:20:24.650540    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:25.651701 kubelet[1870]: E0209 00:20:25.651644    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:26.652809 kubelet[1870]: E0209 00:20:26.652749    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:27.653620 kubelet[1870]: E0209 00:20:27.653562    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:28.654617 kubelet[1870]: E0209 00:20:28.654559    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:29.654819 kubelet[1870]: E0209 00:20:29.654766    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:30.191627 kubelet[1870]: E0209 00:20:30.191582    1870 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.8.12\": Get \"https://10.200.8.16:6443/api/v1/nodes/10.200.8.12?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"
Feb  9 00:20:30.628995 kubelet[1870]: E0209 00:20:30.628701    1870 controller.go:189] failed to update lease, error: Put "https://10.200.8.16:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.12?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)
Feb  9 00:20:30.655321 kubelet[1870]: E0209 00:20:30.655266    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:31.656367 kubelet[1870]: E0209 00:20:31.656308    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:32.657234 kubelet[1870]: E0209 00:20:32.657172    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:33.658255 kubelet[1870]: E0209 00:20:33.658203    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:34.658420 kubelet[1870]: E0209 00:20:34.658368    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:35.545617 kubelet[1870]: E0209 00:20:35.545558    1870 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:35.659262 kubelet[1870]: E0209 00:20:35.659223    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:36.660284 kubelet[1870]: E0209 00:20:36.660230    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:37.660938 kubelet[1870]: E0209 00:20:37.660902    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:38.661523 kubelet[1870]: E0209 00:20:38.661449    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:39.662558 kubelet[1870]: E0209 00:20:39.662501    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:40.192831 kubelet[1870]: E0209 00:20:40.192778    1870 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.8.12\": Get \"https://10.200.8.16:6443/api/v1/nodes/10.200.8.12?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"
Feb  9 00:20:40.629472 kubelet[1870]: E0209 00:20:40.629421    1870 controller.go:189] failed to update lease, error: Put "https://10.200.8.16:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.12?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)
Feb  9 00:20:40.663097 kubelet[1870]: E0209 00:20:40.663033    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:41.664244 kubelet[1870]: E0209 00:20:41.664145    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:42.665159 kubelet[1870]: E0209 00:20:42.665068    1870 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Feb  9 00:20:42.911219 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.911594 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.911758 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.921888 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.922150 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.940680 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.940970 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.946072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.951476 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.957007 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.975614 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.975861 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.981330 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.986858 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:42.997998 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.011413 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.011738 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.022414 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.022670 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.027809 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.047204 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.047442 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.058447 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.058698 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.063607 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.083141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.083373 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.094092 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.094327 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.099407 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.111224 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.111499 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.116691 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.121766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.126551 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.137521 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.137735 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.148368 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.148593 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.158962 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.187409 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.187606 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.187734 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.187866 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.187994 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.188117 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.192882 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.198643 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.209937 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.210173 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.221881 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.222144 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.234112 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.234347 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.245957 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.246198 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.251939 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.262977 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.263183 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.275202 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.281676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.281898 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.287108 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.292960 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.304017 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.304244 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.315438 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.315651 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.327022 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.327232 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.338407 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.338635 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.349608 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.349818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.360663 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.366781 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.366991 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.378227 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.378442 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.389591 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.389805 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.400524 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.400734 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.411660 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.411873 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.429059 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.429277 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.429412 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.440216 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.440424 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#17 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.451654 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Feb  9 00:20:43.451876 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001