Feb 9 19:04:40.025313 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:04:40.025345 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:04:40.025357 kernel: BIOS-provided physical RAM map: Feb 9 19:04:40.025366 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 19:04:40.025375 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 9 19:04:40.025383 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 9 19:04:40.025397 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 9 19:04:40.025406 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 9 19:04:40.025416 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 9 19:04:40.025425 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 9 19:04:40.025434 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 9 19:04:40.025444 kernel: printk: bootconsole [earlyser0] enabled Feb 9 19:04:40.025454 kernel: NX (Execute Disable) protection: active Feb 9 19:04:40.025464 kernel: efi: EFI v2.70 by Microsoft Feb 9 19:04:40.025478 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Feb 9 19:04:40.025490 kernel: random: crng init done Feb 9 19:04:40.025501 kernel: SMBIOS 3.1.0 present. Feb 9 19:04:40.025513 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 19:04:40.025524 kernel: Hypervisor detected: Microsoft Hyper-V Feb 9 19:04:40.025535 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 9 19:04:40.025546 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 9 19:04:40.025558 kernel: Hyper-V: Nested features: 0x1e0101 Feb 9 19:04:40.025571 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 9 19:04:40.025582 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 9 19:04:40.025593 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 9 19:04:40.025605 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 9 19:04:40.025617 kernel: tsc: Detected 2593.905 MHz processor Feb 9 19:04:40.025628 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:04:40.025640 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:04:40.025652 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 9 19:04:40.025663 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:04:40.025675 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 9 19:04:40.025688 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 9 19:04:40.025700 kernel: Using GB pages for direct mapping Feb 9 19:04:40.025711 kernel: Secure boot disabled Feb 9 19:04:40.025723 kernel: ACPI: Early table checksum verification disabled Feb 9 19:04:40.025734 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 9 19:04:40.025746 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025757 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025769 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 19:04:40.025786 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 9 19:04:40.025799 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025811 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025823 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025835 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025848 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025863 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025875 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:04:40.025888 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 9 19:04:40.025900 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 9 19:04:40.025913 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 9 19:04:40.025925 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 9 19:04:40.025937 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 9 19:04:40.025950 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 9 19:04:40.025964 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 9 19:04:40.025976 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 9 19:04:40.025989 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 9 19:04:40.026001 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 9 19:04:40.026014 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:04:40.026026 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:04:40.026038 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 9 19:04:40.026051 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 9 19:04:40.026063 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 9 19:04:40.026078 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 9 19:04:40.026090 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 9 19:04:40.026102 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 9 19:04:40.026114 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 9 19:04:40.026127 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 9 19:04:40.026139 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 9 19:04:40.026151 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 9 19:04:40.026163 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 9 19:04:40.026176 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 9 19:04:40.026190 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 9 19:04:40.026203 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 9 19:04:40.026215 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 9 19:04:40.026227 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 9 19:04:40.026240 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 9 19:04:40.026252 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 9 19:04:40.026264 kernel: Zone ranges: Feb 9 19:04:40.026288 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:04:40.026301 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:04:40.026315 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 9 19:04:40.026328 kernel: Movable zone start for each node Feb 9 19:04:40.026340 kernel: Early memory node ranges Feb 9 19:04:40.026352 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 19:04:40.026364 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 9 19:04:40.026377 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 9 19:04:40.026389 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 9 19:04:40.026401 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 9 19:04:40.026413 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:04:40.026428 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 19:04:40.026441 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 9 19:04:40.026453 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 9 19:04:40.026465 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 9 19:04:40.026478 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:04:40.026490 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:04:40.026502 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:04:40.026515 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 9 19:04:40.026527 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:04:40.026541 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 9 19:04:40.026553 kernel: Booting paravirtualized kernel on Hyper-V Feb 9 19:04:40.026566 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:04:40.026578 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:04:40.026591 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:04:40.026603 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:04:40.026615 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:04:40.026627 kernel: Hyper-V: PV spinlocks enabled Feb 9 19:04:40.026639 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:04:40.026653 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 9 19:04:40.026666 kernel: Policy zone: Normal Feb 9 19:04:40.026680 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:04:40.026693 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:04:40.026705 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:04:40.026717 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:04:40.026730 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:04:40.026742 kernel: Memory: 8081200K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved) Feb 9 19:04:40.026757 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:04:40.026769 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:04:40.026791 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:04:40.026806 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:04:40.026819 kernel: rcu: RCU event tracing is enabled. Feb 9 19:04:40.026833 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:04:40.026845 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:04:40.026866 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:04:40.026879 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:04:40.026891 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:04:40.026904 kernel: Using NULL legacy PIC Feb 9 19:04:40.026919 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 9 19:04:40.026932 kernel: Console: colour dummy device 80x25 Feb 9 19:04:40.026944 kernel: printk: console [tty1] enabled Feb 9 19:04:40.026957 kernel: printk: console [ttyS0] enabled Feb 9 19:04:40.026970 kernel: printk: bootconsole [earlyser0] disabled Feb 9 19:04:40.026984 kernel: ACPI: Core revision 20210730 Feb 9 19:04:40.026996 kernel: Failed to register legacy timer interrupt Feb 9 19:04:40.027008 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:04:40.027021 kernel: Hyper-V: Using IPI hypercalls Feb 9 19:04:40.027034 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Feb 9 19:04:40.027047 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 19:04:40.027060 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 19:04:40.027071 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:04:40.027083 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:04:40.027095 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:04:40.027112 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:04:40.027125 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 9 19:04:40.027137 kernel: RETBleed: Vulnerable Feb 9 19:04:40.027149 kernel: Speculative Store Bypass: Vulnerable Feb 9 19:04:40.027161 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:04:40.027174 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:04:40.027186 kernel: GDS: Unknown: Dependent on hypervisor status Feb 9 19:04:40.027197 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:04:40.027210 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:04:40.027223 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:04:40.027240 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 9 19:04:40.027251 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 9 19:04:40.027264 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 9 19:04:40.027319 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:04:40.027334 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 9 19:04:40.027347 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 9 19:04:40.027360 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 9 19:04:40.027373 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 9 19:04:40.027385 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:04:40.027396 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:04:40.027408 kernel: LSM: Security Framework initializing Feb 9 19:04:40.027419 kernel: SELinux: Initializing. Feb 9 19:04:40.027435 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:04:40.027453 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:04:40.027467 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 9 19:04:40.027479 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 9 19:04:40.027491 kernel: signal: max sigframe size: 3632 Feb 9 19:04:40.027504 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:04:40.027516 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:04:40.027528 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:04:40.027542 kernel: x86: Booting SMP configuration: Feb 9 19:04:40.027555 kernel: .... node #0, CPUs: #1 Feb 9 19:04:40.027572 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 9 19:04:40.027586 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:04:40.027600 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:04:40.027613 kernel: smpboot: Max logical packages: 1 Feb 9 19:04:40.027626 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 9 19:04:40.027639 kernel: devtmpfs: initialized Feb 9 19:04:40.027653 kernel: x86/mm: Memory block size: 128MB Feb 9 19:04:40.027667 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 9 19:04:40.027682 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:04:40.027696 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:04:40.027707 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:04:40.027718 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:04:40.027732 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:04:40.027745 kernel: audit: type=2000 audit(1707505479.023:1): state=initialized audit_enabled=0 res=1 Feb 9 19:04:40.027758 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:04:40.027770 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:04:40.027782 kernel: cpuidle: using governor menu Feb 9 19:04:40.027798 kernel: ACPI: bus type PCI registered Feb 9 19:04:40.027811 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:04:40.027823 kernel: dca service started, version 1.12.1 Feb 9 19:04:40.027835 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:04:40.027847 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:04:40.027859 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:04:40.027872 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:04:40.027885 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:04:40.027896 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:04:40.027914 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:04:40.027928 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:04:40.027941 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:04:40.027955 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:04:40.027969 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:04:40.027983 kernel: ACPI: Interpreter enabled Feb 9 19:04:40.027998 kernel: ACPI: PM: (supports S0 S5) Feb 9 19:04:40.028012 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:04:40.028025 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:04:40.028041 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 9 19:04:40.028054 kernel: iommu: Default domain type: Translated Feb 9 19:04:40.028067 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:04:40.028079 kernel: vgaarb: loaded Feb 9 19:04:40.028091 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:04:40.028103 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:04:40.028115 kernel: PTP clock support registered Feb 9 19:04:40.028127 kernel: Registered efivars operations Feb 9 19:04:40.028139 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:04:40.028151 kernel: PCI: System does not support PCI Feb 9 19:04:40.028166 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 9 19:04:40.028179 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:04:40.028192 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:04:40.028205 kernel: pnp: PnP ACPI init Feb 9 19:04:40.028218 kernel: pnp: PnP ACPI: found 3 devices Feb 9 19:04:40.028232 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:04:40.028244 kernel: NET: Registered PF_INET protocol family Feb 9 19:04:40.028257 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:04:40.028272 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:04:40.028298 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:04:40.028312 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:04:40.028324 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:04:40.028338 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:04:40.028351 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:04:40.028366 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:04:40.028379 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:04:40.028393 kernel: NET: Registered PF_XDP protocol family Feb 9 19:04:40.028410 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:04:40.028424 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:04:40.028438 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 9 19:04:40.028460 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:04:40.028473 kernel: Initialise system trusted keyrings Feb 9 19:04:40.028486 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:04:40.028500 kernel: Key type asymmetric registered Feb 9 19:04:40.028513 kernel: Asymmetric key parser 'x509' registered Feb 9 19:04:40.028526 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:04:40.028543 kernel: io scheduler mq-deadline registered Feb 9 19:04:40.028557 kernel: io scheduler kyber registered Feb 9 19:04:40.028570 kernel: io scheduler bfq registered Feb 9 19:04:40.028588 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:04:40.028603 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:04:40.028616 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:04:40.028631 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:04:40.028644 kernel: i8042: PNP: No PS/2 controller found. Feb 9 19:04:40.028811 kernel: rtc_cmos 00:02: registered as rtc0 Feb 9 19:04:40.028930 kernel: rtc_cmos 00:02: setting system clock to 2024-02-09T19:04:39 UTC (1707505479) Feb 9 19:04:40.029040 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 9 19:04:40.029058 kernel: fail to initialize ptp_kvm Feb 9 19:04:40.029072 kernel: intel_pstate: CPU model not supported Feb 9 19:04:40.029086 kernel: efifb: probing for efifb Feb 9 19:04:40.029100 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 19:04:40.029113 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 19:04:40.029129 kernel: efifb: scrolling: redraw Feb 9 19:04:40.029146 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 19:04:40.029161 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 19:04:40.029174 kernel: fb0: EFI VGA frame buffer device Feb 9 19:04:40.029188 kernel: pstore: Registered efi as persistent store backend Feb 9 19:04:40.029202 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:04:40.029215 kernel: Segment Routing with IPv6 Feb 9 19:04:40.029229 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:04:40.029242 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:04:40.029254 kernel: Key type dns_resolver registered Feb 9 19:04:40.029270 kernel: IPI shorthand broadcast: enabled Feb 9 19:04:40.029296 kernel: sched_clock: Marking stable (723362600, 20648500)->(936913400, -192902300) Feb 9 19:04:40.029309 kernel: registered taskstats version 1 Feb 9 19:04:40.029324 kernel: Loading compiled-in X.509 certificates Feb 9 19:04:40.029338 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:04:40.029353 kernel: Key type .fscrypt registered Feb 9 19:04:40.029366 kernel: Key type fscrypt-provisioning registered Feb 9 19:04:40.029380 kernel: pstore: Using crash dump compression: deflate Feb 9 19:04:40.029397 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:04:40.029411 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:04:40.029426 kernel: ima: No architecture policies found Feb 9 19:04:40.029441 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:04:40.029454 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:04:40.029468 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:04:40.029482 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:04:40.029495 kernel: Run /init as init process Feb 9 19:04:40.029509 kernel: with arguments: Feb 9 19:04:40.029523 kernel: /init Feb 9 19:04:40.029539 kernel: with environment: Feb 9 19:04:40.029552 kernel: HOME=/ Feb 9 19:04:40.029565 kernel: TERM=linux Feb 9 19:04:40.029578 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:04:40.029595 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:04:40.029612 systemd[1]: Detected virtualization microsoft. Feb 9 19:04:40.029627 systemd[1]: Detected architecture x86-64. Feb 9 19:04:40.029644 systemd[1]: Running in initrd. Feb 9 19:04:40.029658 systemd[1]: No hostname configured, using default hostname. Feb 9 19:04:40.029671 systemd[1]: Hostname set to . Feb 9 19:04:40.029686 systemd[1]: Initializing machine ID from random generator. Feb 9 19:04:40.029701 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:04:40.029715 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:04:40.029729 systemd[1]: Reached target cryptsetup.target. Feb 9 19:04:40.029744 systemd[1]: Reached target paths.target. Feb 9 19:04:40.029758 systemd[1]: Reached target slices.target. Feb 9 19:04:40.029776 systemd[1]: Reached target swap.target. Feb 9 19:04:40.029790 systemd[1]: Reached target timers.target. Feb 9 19:04:40.029805 systemd[1]: Listening on iscsid.socket. Feb 9 19:04:40.029819 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:04:40.029834 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:04:40.029848 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:04:40.029863 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:04:40.029880 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:04:40.029892 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:04:40.029906 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:04:40.029920 systemd[1]: Reached target sockets.target. Feb 9 19:04:40.029934 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:04:40.029949 systemd[1]: Finished network-cleanup.service. Feb 9 19:04:40.029964 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:04:40.029979 systemd[1]: Starting systemd-journald.service... Feb 9 19:04:40.029993 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:04:40.030012 systemd[1]: Starting systemd-resolved.service... Feb 9 19:04:40.030028 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:04:40.030046 systemd-journald[183]: Journal started Feb 9 19:04:40.030114 systemd-journald[183]: Runtime Journal (/run/log/journal/95df0b66f92d47ddad160128f7753d31) is 8.0M, max 159.0M, 151.0M free. Feb 9 19:04:40.030911 systemd-modules-load[184]: Inserted module 'overlay' Feb 9 19:04:40.049297 systemd[1]: Started systemd-journald.service. Feb 9 19:04:40.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.069177 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:04:40.103435 kernel: audit: type=1130 audit(1707505480.058:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.103475 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:04:40.103493 kernel: Bridge firewalling registered Feb 9 19:04:40.098552 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 9 19:04:40.116586 kernel: audit: type=1130 audit(1707505480.105:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.116615 kernel: SCSI subsystem initialized Feb 9 19:04:40.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.116703 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:04:40.135625 kernel: audit: type=1130 audit(1707505480.121:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.122117 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:04:40.141820 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:04:40.147004 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:04:40.164301 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:04:40.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.167547 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:04:40.183333 kernel: audit: type=1130 audit(1707505480.140:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.192742 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:04:40.192793 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:04:40.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.195880 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:04:40.213805 kernel: audit: type=1130 audit(1707505480.195:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.209481 systemd-resolved[185]: Positive Trust Anchors: Feb 9 19:04:40.209495 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:04:40.209767 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:04:40.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.223311 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:04:40.246944 kernel: audit: type=1130 audit(1707505480.208:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.246976 dracut-cmdline[200]: dracut-dracut-053 Feb 9 19:04:40.246976 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:04:40.296684 kernel: audit: type=1130 audit(1707505480.246:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.296726 kernel: audit: type=1130 audit(1707505480.277:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.226088 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 9 19:04:40.233946 systemd[1]: Started systemd-resolved.service. Feb 9 19:04:40.247025 systemd[1]: Reached target nss-lookup.target. Feb 9 19:04:40.259213 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 9 19:04:40.261657 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:04:40.279001 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:04:40.310261 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:04:40.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.328302 kernel: audit: type=1130 audit(1707505480.313:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.352304 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:04:40.365302 kernel: iscsi: registered transport (tcp) Feb 9 19:04:40.389833 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:04:40.389910 kernel: QLogic iSCSI HBA Driver Feb 9 19:04:40.419121 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:04:40.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.424558 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:04:40.474305 kernel: raid6: avx512x4 gen() 18363 MB/s Feb 9 19:04:40.493291 kernel: raid6: avx512x4 xor() 7190 MB/s Feb 9 19:04:40.512299 kernel: raid6: avx512x2 gen() 18612 MB/s Feb 9 19:04:40.533295 kernel: raid6: avx512x2 xor() 29739 MB/s Feb 9 19:04:40.552289 kernel: raid6: avx512x1 gen() 18436 MB/s Feb 9 19:04:40.572290 kernel: raid6: avx512x1 xor() 26905 MB/s Feb 9 19:04:40.593289 kernel: raid6: avx2x4 gen() 18583 MB/s Feb 9 19:04:40.612286 kernel: raid6: avx2x4 xor() 6946 MB/s Feb 9 19:04:40.632289 kernel: raid6: avx2x2 gen() 18517 MB/s Feb 9 19:04:40.652296 kernel: raid6: avx2x2 xor() 22275 MB/s Feb 9 19:04:40.671292 kernel: raid6: avx2x1 gen() 13863 MB/s Feb 9 19:04:40.691289 kernel: raid6: avx2x1 xor() 19335 MB/s Feb 9 19:04:40.711293 kernel: raid6: sse2x4 gen() 11676 MB/s Feb 9 19:04:40.730293 kernel: raid6: sse2x4 xor() 6429 MB/s Feb 9 19:04:40.750291 kernel: raid6: sse2x2 gen() 12845 MB/s Feb 9 19:04:40.770294 kernel: raid6: sse2x2 xor() 7475 MB/s Feb 9 19:04:40.790292 kernel: raid6: sse2x1 gen() 11560 MB/s Feb 9 19:04:40.812348 kernel: raid6: sse2x1 xor() 5930 MB/s Feb 9 19:04:40.812370 kernel: raid6: using algorithm avx512x2 gen() 18612 MB/s Feb 9 19:04:40.812384 kernel: raid6: .... xor() 29739 MB/s, rmw enabled Feb 9 19:04:40.815362 kernel: raid6: using avx512x2 recovery algorithm Feb 9 19:04:40.834306 kernel: xor: automatically using best checksumming function avx Feb 9 19:04:40.930305 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:04:40.938854 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:04:40.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.942000 audit: BPF prog-id=7 op=LOAD Feb 9 19:04:40.942000 audit: BPF prog-id=8 op=LOAD Feb 9 19:04:40.943715 systemd[1]: Starting systemd-udevd.service... Feb 9 19:04:40.958363 systemd-udevd[383]: Using default interface naming scheme 'v252'. Feb 9 19:04:40.963005 systemd[1]: Started systemd-udevd.service. Feb 9 19:04:40.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:40.971479 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:04:40.987439 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Feb 9 19:04:41.018905 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:04:41.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:41.024381 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:04:41.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:41.060845 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:04:41.102305 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:04:41.134317 kernel: hv_vmbus: Vmbus version:5.2 Feb 9 19:04:41.144452 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:04:41.144517 kernel: AES CTR mode by8 optimization enabled Feb 9 19:04:41.159300 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 19:04:41.167299 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 19:04:41.181479 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 19:04:41.181544 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 19:04:41.181559 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 19:04:41.198959 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 19:04:41.199195 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 19:04:41.208356 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 19:04:41.218293 kernel: scsi host0: storvsc_host_t Feb 9 19:04:41.218559 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 19:04:41.226780 kernel: scsi host1: storvsc_host_t Feb 9 19:04:41.227025 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 19:04:41.254975 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 19:04:41.255317 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 19:04:41.263313 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 19:04:41.263505 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 19:04:41.263627 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 19:04:41.266636 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 19:04:41.266823 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 19:04:41.266938 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 19:04:41.276299 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:04:41.280292 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 19:04:41.404245 kernel: hv_netvsc 000d3ad7-e7c1-000d-3ad7-e7c1000d3ad7 eth0: VF slot 1 added Feb 9 19:04:41.418600 kernel: hv_vmbus: registering driver hv_pci Feb 9 19:04:41.418657 kernel: hv_pci 2869ef9c-8923-423e-8c56-da2fb177f16d: PCI VMBus probing: Using version 0x10004 Feb 9 19:04:41.430719 kernel: hv_pci 2869ef9c-8923-423e-8c56-da2fb177f16d: PCI host bridge to bus 8923:00 Feb 9 19:04:41.430948 kernel: pci_bus 8923:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 9 19:04:41.431077 kernel: pci_bus 8923:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 19:04:41.441511 kernel: pci 8923:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 9 19:04:41.451067 kernel: pci 8923:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 9 19:04:41.466659 kernel: pci 8923:00:02.0: enabling Extended Tags Feb 9 19:04:41.479301 kernel: pci 8923:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 8923:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 9 19:04:41.492884 kernel: pci_bus 8923:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 19:04:41.493102 kernel: pci 8923:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 9 19:04:41.585310 kernel: mlx5_core 8923:00:02.0: firmware version: 14.30.1350 Feb 9 19:04:41.623381 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:04:41.659302 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (438) Feb 9 19:04:41.680148 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:04:41.750297 kernel: mlx5_core 8923:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 19:04:41.826271 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:04:41.831589 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:04:41.841965 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:04:41.845176 systemd[1]: Starting disk-uuid.service... Feb 9 19:04:41.859294 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:04:41.869299 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:04:41.964543 kernel: mlx5_core 8923:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 9 19:04:41.964825 kernel: mlx5_core 8923:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Feb 9 19:04:41.982653 kernel: hv_netvsc 000d3ad7-e7c1-000d-3ad7-e7c1000d3ad7 eth0: VF registering: eth1 Feb 9 19:04:41.982909 kernel: mlx5_core 8923:00:02.0 eth1: joined to eth0 Feb 9 19:04:42.007306 kernel: mlx5_core 8923:00:02.0 enP35107s1: renamed from eth1 Feb 9 19:04:42.869677 disk-uuid[561]: The operation has completed successfully. Feb 9 19:04:42.872439 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:04:42.945239 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:04:42.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:42.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:42.945356 systemd[1]: Finished disk-uuid.service. Feb 9 19:04:42.953169 systemd[1]: Starting verity-setup.service... Feb 9 19:04:42.986303 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:04:43.164227 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:04:43.168602 systemd[1]: Finished verity-setup.service. Feb 9 19:04:43.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:43.173087 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:04:43.246297 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:04:43.246988 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:04:43.248974 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:04:43.249815 systemd[1]: Starting ignition-setup.service... Feb 9 19:04:43.253748 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:04:43.275818 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:04:43.275864 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:04:43.275878 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:04:43.325128 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:04:43.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:43.330000 audit: BPF prog-id=9 op=LOAD Feb 9 19:04:43.331365 systemd[1]: Starting systemd-networkd.service... Feb 9 19:04:43.358757 systemd-networkd[800]: lo: Link UP Feb 9 19:04:43.358767 systemd-networkd[800]: lo: Gained carrier Feb 9 19:04:43.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:43.359692 systemd-networkd[800]: Enumeration completed Feb 9 19:04:43.359773 systemd[1]: Started systemd-networkd.service. Feb 9 19:04:43.362177 systemd-networkd[800]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:04:43.363068 systemd[1]: Reached target network.target. Feb 9 19:04:43.370492 systemd[1]: Starting iscsiuio.service... Feb 9 19:04:43.384740 systemd[1]: Started iscsiuio.service. Feb 9 19:04:43.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:43.389573 systemd[1]: Starting iscsid.service... Feb 9 19:04:43.396275 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:04:43.398254 iscsid[811]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:04:43.398254 iscsid[811]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:04:43.398254 iscsid[811]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:04:43.398254 iscsid[811]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:04:43.398254 iscsid[811]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:04:43.398254 iscsid[811]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:04:43.423058 systemd[1]: Started iscsid.service. Feb 9 19:04:43.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:43.430142 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:04:43.441293 kernel: mlx5_core 8923:00:02.0 enP35107s1: Link up Feb 9 19:04:43.442939 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:04:43.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:43.446868 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:04:43.450897 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:04:43.454901 systemd[1]: Reached target remote-fs.target. Feb 9 19:04:43.459429 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:04:43.472252 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:04:43.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:43.476366 systemd[1]: Finished ignition-setup.service. Feb 9 19:04:43.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:43.479129 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:04:43.516298 kernel: hv_netvsc 000d3ad7-e7c1-000d-3ad7-e7c1000d3ad7 eth0: Data path switched to VF: enP35107s1 Feb 9 19:04:43.521847 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:04:43.520777 systemd-networkd[800]: enP35107s1: Link UP Feb 9 19:04:43.520916 systemd-networkd[800]: eth0: Link UP Feb 9 19:04:43.521120 systemd-networkd[800]: eth0: Gained carrier Feb 9 19:04:43.525885 systemd-networkd[800]: enP35107s1: Gained carrier Feb 9 19:04:43.565391 systemd-networkd[800]: eth0: DHCPv4 address 10.200.8.43/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:04:45.443522 systemd-networkd[800]: eth0: Gained IPv6LL Feb 9 19:04:46.197416 ignition[827]: Ignition 2.14.0 Feb 9 19:04:46.197435 ignition[827]: Stage: fetch-offline Feb 9 19:04:46.197533 ignition[827]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:04:46.197606 ignition[827]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:04:46.270619 ignition[827]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:04:46.270833 ignition[827]: parsed url from cmdline: "" Feb 9 19:04:46.270838 ignition[827]: no config URL provided Feb 9 19:04:46.270844 ignition[827]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:04:46.274108 ignition[827]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:04:46.274121 ignition[827]: failed to fetch config: resource requires networking Feb 9 19:04:46.274964 ignition[827]: Ignition finished successfully Feb 9 19:04:46.290070 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:04:46.299996 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 19:04:46.300045 kernel: audit: type=1130 audit(1707505486.294:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.295787 systemd[1]: Starting ignition-fetch.service... Feb 9 19:04:46.305024 ignition[833]: Ignition 2.14.0 Feb 9 19:04:46.305031 ignition[833]: Stage: fetch Feb 9 19:04:46.305158 ignition[833]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:04:46.305187 ignition[833]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:04:46.309314 ignition[833]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:04:46.313523 ignition[833]: parsed url from cmdline: "" Feb 9 19:04:46.313531 ignition[833]: no config URL provided Feb 9 19:04:46.313540 ignition[833]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:04:46.313550 ignition[833]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:04:46.313591 ignition[833]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 19:04:46.397946 ignition[833]: GET result: OK Feb 9 19:04:46.398099 ignition[833]: config has been read from IMDS userdata Feb 9 19:04:46.398132 ignition[833]: parsing config with SHA512: 83dd58eac5639f64a3cdf36bf792f3dbdf1690a37089d199db1aba428c73b3f85f0d42d8a197c4271dabf8410c8045534c28d56d74636e7d8158804945a8e759 Feb 9 19:04:46.414892 unknown[833]: fetched base config from "system" Feb 9 19:04:46.415097 unknown[833]: fetched base config from "system" Feb 9 19:04:46.415105 unknown[833]: fetched user config from "azure" Feb 9 19:04:46.428687 ignition[833]: fetch: fetch complete Feb 9 19:04:46.428697 ignition[833]: fetch: fetch passed Feb 9 19:04:46.428760 ignition[833]: Ignition finished successfully Feb 9 19:04:46.434679 systemd[1]: Finished ignition-fetch.service. Feb 9 19:04:46.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.449618 systemd[1]: Starting ignition-kargs.service... Feb 9 19:04:46.453417 kernel: audit: type=1130 audit(1707505486.436:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.462251 ignition[839]: Ignition 2.14.0 Feb 9 19:04:46.464117 ignition[839]: Stage: kargs Feb 9 19:04:46.465517 ignition[839]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:04:46.465553 ignition[839]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:04:46.472936 ignition[839]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:04:46.474139 ignition[839]: kargs: kargs passed Feb 9 19:04:46.476517 systemd[1]: Finished ignition-kargs.service. Feb 9 19:04:46.474177 ignition[839]: Ignition finished successfully Feb 9 19:04:46.480460 systemd[1]: Starting ignition-disks.service... Feb 9 19:04:46.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.497295 kernel: audit: type=1130 audit(1707505486.479:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.501233 ignition[845]: Ignition 2.14.0 Feb 9 19:04:46.501242 ignition[845]: Stage: disks Feb 9 19:04:46.501390 ignition[845]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:04:46.501423 ignition[845]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:04:46.508323 systemd[1]: Finished ignition-disks.service. Feb 9 19:04:46.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.505022 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:04:46.532254 kernel: audit: type=1130 audit(1707505486.510:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.510750 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:04:46.507053 ignition[845]: disks: disks passed Feb 9 19:04:46.532295 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:04:46.507116 ignition[845]: Ignition finished successfully Feb 9 19:04:46.541476 systemd[1]: Reached target local-fs.target. Feb 9 19:04:46.545319 systemd[1]: Reached target sysinit.target. Feb 9 19:04:46.549008 systemd[1]: Reached target basic.target. Feb 9 19:04:46.553525 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:04:46.598983 systemd-fsck[853]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 9 19:04:46.607924 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:04:46.626536 kernel: audit: type=1130 audit(1707505486.609:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.611101 systemd[1]: Mounting sysroot.mount... Feb 9 19:04:46.639120 systemd[1]: Mounted sysroot.mount. Feb 9 19:04:46.642572 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:04:46.642734 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:04:46.676938 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:04:46.682531 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 19:04:46.686984 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:04:46.687045 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:04:46.693949 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:04:46.720891 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:04:46.726272 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:04:46.736669 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (864) Feb 9 19:04:46.746299 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:04:46.746337 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:04:46.746349 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:04:46.750502 initrd-setup-root[869]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:04:46.757128 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:04:46.767411 initrd-setup-root[895]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:04:46.773698 initrd-setup-root[903]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:04:46.779689 initrd-setup-root[911]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:04:47.152064 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:04:47.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:47.167794 kernel: audit: type=1130 audit(1707505487.154:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:47.166709 systemd[1]: Starting ignition-mount.service... Feb 9 19:04:47.170480 systemd[1]: Starting sysroot-boot.service... Feb 9 19:04:47.182307 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:04:47.182426 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:04:47.203265 systemd[1]: Finished sysroot-boot.service. Feb 9 19:04:47.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:47.220376 kernel: audit: type=1130 audit(1707505487.207:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:47.221316 ignition[932]: INFO : Ignition 2.14.0 Feb 9 19:04:47.223597 ignition[932]: INFO : Stage: mount Feb 9 19:04:47.225266 ignition[932]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:04:47.228042 ignition[932]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:04:47.236439 ignition[932]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:04:47.243639 ignition[932]: INFO : mount: mount passed Feb 9 19:04:47.245492 ignition[932]: INFO : Ignition finished successfully Feb 9 19:04:47.247546 systemd[1]: Finished ignition-mount.service. Feb 9 19:04:47.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:47.261290 kernel: audit: type=1130 audit(1707505487.249:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:47.895942 coreos-metadata[863]: Feb 09 19:04:47.895 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 19:04:47.908403 coreos-metadata[863]: Feb 09 19:04:47.908 INFO Fetch successful Feb 9 19:04:47.941122 coreos-metadata[863]: Feb 09 19:04:47.940 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 19:04:47.960773 coreos-metadata[863]: Feb 09 19:04:47.960 INFO Fetch successful Feb 9 19:04:47.992865 coreos-metadata[863]: Feb 09 19:04:47.992 INFO wrote hostname ci-3510.3.2-a-bfd6d81330 to /sysroot/etc/hostname Feb 9 19:04:47.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:47.995289 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 19:04:48.016046 kernel: audit: type=1130 audit(1707505487.998:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:48.000459 systemd[1]: Starting ignition-files.service... Feb 9 19:04:48.019466 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:04:48.036641 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (942) Feb 9 19:04:48.036690 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:04:48.036704 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:04:48.043428 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:04:48.048366 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:04:48.062085 ignition[961]: INFO : Ignition 2.14.0 Feb 9 19:04:48.062085 ignition[961]: INFO : Stage: files Feb 9 19:04:48.065807 ignition[961]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:04:48.065807 ignition[961]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:04:48.078418 ignition[961]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:04:48.093778 ignition[961]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:04:48.098438 ignition[961]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:04:48.098438 ignition[961]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:04:48.171624 ignition[961]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:04:48.175748 ignition[961]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:04:48.179154 ignition[961]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:04:48.179154 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:04:48.179154 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 19:04:48.176623 unknown[961]: wrote ssh authorized keys file for user: core Feb 9 19:04:48.814045 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:04:48.996906 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 19:04:49.004098 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:04:49.004098 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:04:49.004098 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:04:49.485880 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:04:49.579743 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 19:04:49.587807 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:04:49.587807 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:04:49.587807 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:04:49.975511 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:04:50.186618 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 19:04:50.194273 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:04:50.194273 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:04:50.194273 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:04:50.316415 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:04:50.875052 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 19:04:50.885883 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:04:50.934130 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (961) Feb 9 19:04:50.934161 kernel: audit: type=1130 audit(1707505490.934:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:50.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:50.904274 systemd[1]: mnt-oem3879226922.mount: Deactivated successfully. Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3879226922" Feb 9 19:04:50.952125 ignition[961]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3879226922": device or resource busy Feb 9 19:04:50.952125 ignition[961]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3879226922", trying btrfs: device or resource busy Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3879226922" Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3879226922" Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3879226922" Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3879226922" Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2093979803" Feb 9 19:04:50.952125 ignition[961]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2093979803": device or resource busy Feb 9 19:04:50.952125 ignition[961]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2093979803", trying btrfs: device or resource busy Feb 9 19:04:50.952125 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2093979803" Feb 9 19:04:50.922608 systemd[1]: mnt-oem2093979803.mount: Deactivated successfully. Feb 9 19:04:51.010186 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2093979803" Feb 9 19:04:51.010186 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2093979803" Feb 9 19:04:51.010186 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2093979803" Feb 9 19:04:51.010186 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Feb 9 19:04:51.010186 ignition[961]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Feb 9 19:04:50.931267 systemd[1]: Finished ignition-files.service. Feb 9 19:04:51.019740 ignition[961]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:04:51.019740 ignition[961]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:04:51.019740 ignition[961]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:04:51.019740 ignition[961]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:04:51.019740 ignition[961]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:04:51.019740 ignition[961]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:04:51.019740 ignition[961]: INFO : files: files passed Feb 9 19:04:51.019740 ignition[961]: INFO : Ignition finished successfully Feb 9 19:04:50.948454 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:04:50.951754 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:04:50.953525 systemd[1]: Starting ignition-quench.service... Feb 9 19:04:50.966487 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:04:50.966591 systemd[1]: Finished ignition-quench.service. Feb 9 19:04:51.028552 initrd-setup-root-after-ignition[986]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:04:51.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.144962 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:04:51.145223 systemd[1]: Reached target ignition-complete.target. Feb 9 19:04:51.146442 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:04:51.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.162056 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:04:51.162166 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:04:51.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.168250 systemd[1]: Reached target initrd-fs.target. Feb 9 19:04:51.172251 systemd[1]: Reached target initrd.target. Feb 9 19:04:51.175703 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:04:51.179246 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:04:51.190038 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:04:51.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.192673 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:04:51.204973 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:04:51.207105 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:04:51.210786 systemd[1]: Stopped target timers.target. Feb 9 19:04:51.214613 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:04:51.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.214752 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:04:51.218461 systemd[1]: Stopped target initrd.target. Feb 9 19:04:51.222349 systemd[1]: Stopped target basic.target. Feb 9 19:04:51.225996 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:04:51.229833 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:04:51.233467 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:04:51.237459 systemd[1]: Stopped target remote-fs.target. Feb 9 19:04:51.241410 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:04:51.246695 systemd[1]: Stopped target sysinit.target. Feb 9 19:04:51.250858 systemd[1]: Stopped target local-fs.target. Feb 9 19:04:51.254676 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:04:51.258651 systemd[1]: Stopped target swap.target. Feb 9 19:04:51.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.262384 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:04:51.262537 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:04:51.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.266559 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:04:51.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.270337 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:04:51.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.270494 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:04:51.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.275502 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:04:51.304968 ignition[999]: INFO : Ignition 2.14.0 Feb 9 19:04:51.304968 ignition[999]: INFO : Stage: umount Feb 9 19:04:51.275637 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:04:51.327066 kernel: kauditd_printk_skb: 12 callbacks suppressed Feb 9 19:04:51.327096 kernel: audit: type=1131 audit(1707505491.310:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.327170 ignition[999]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:04:51.327170 ignition[999]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:04:51.280509 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:04:51.337302 ignition[999]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:04:51.337302 ignition[999]: INFO : umount: umount passed Feb 9 19:04:51.337302 ignition[999]: INFO : Ignition finished successfully Feb 9 19:04:51.280638 systemd[1]: Stopped ignition-files.service. Feb 9 19:04:51.284920 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 19:04:51.285051 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 19:04:51.290534 systemd[1]: Stopping ignition-mount.service... Feb 9 19:04:51.304952 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:04:51.305144 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:04:51.326860 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:04:51.359393 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:04:51.359696 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:04:51.367641 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:04:51.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.367880 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:04:51.382427 kernel: audit: type=1131 audit(1707505491.367:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.386443 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:04:51.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.386861 systemd[1]: Stopped ignition-mount.service. Feb 9 19:04:51.399822 kernel: audit: type=1131 audit(1707505491.384:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.404739 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:04:51.418779 kernel: audit: type=1131 audit(1707505491.403:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.404860 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:04:51.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.419677 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:04:51.459520 kernel: audit: type=1130 audit(1707505491.418:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.459555 kernel: audit: type=1131 audit(1707505491.418:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.459571 kernel: audit: type=1131 audit(1707505491.443:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.419734 systemd[1]: Stopped ignition-disks.service. Feb 9 19:04:51.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.444196 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:04:51.472600 kernel: audit: type=1131 audit(1707505491.459:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.444255 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:04:51.459551 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:04:51.459612 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:04:51.470465 systemd[1]: Stopped target network.target. Feb 9 19:04:51.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.486294 kernel: audit: type=1131 audit(1707505491.470:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.493110 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:04:51.493191 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:04:51.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.497870 systemd[1]: Stopped target paths.target. Feb 9 19:04:51.512799 kernel: audit: type=1131 audit(1707505491.497:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.510371 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:04:51.517352 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:04:51.522091 systemd[1]: Stopped target slices.target. Feb 9 19:04:51.525636 systemd[1]: Stopped target sockets.target. Feb 9 19:04:51.530956 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:04:51.531005 systemd[1]: Closed iscsid.socket. Feb 9 19:04:51.548486 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:04:51.548527 systemd[1]: Closed iscsiuio.socket. Feb 9 19:04:51.553902 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:04:51.556082 systemd[1]: Stopped ignition-setup.service. Feb 9 19:04:51.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.559813 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:04:51.564273 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:04:51.568336 systemd-networkd[800]: eth0: DHCPv6 lease lost Feb 9 19:04:51.569585 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:04:51.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.574261 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:04:51.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.574393 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:04:51.577215 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:04:51.577329 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:04:51.587000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:04:51.587000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:04:51.588298 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:04:51.588353 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:04:51.595484 systemd[1]: Stopping network-cleanup.service... Feb 9 19:04:51.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.597724 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:04:51.597810 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:04:51.601789 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:04:51.601845 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:04:51.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.611939 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:04:51.612002 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:04:51.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.617124 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:04:51.622134 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:04:51.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.622265 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:04:51.628726 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:04:51.628781 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:04:51.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.631601 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:04:51.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.631643 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:04:51.635947 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:04:51.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.636001 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:04:51.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.639955 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:04:51.640006 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:04:51.641872 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:04:51.641913 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:04:51.647392 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:04:51.656422 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:04:51.656483 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:04:51.661247 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:04:51.661360 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:04:51.706296 kernel: hv_netvsc 000d3ad7-e7c1-000d-3ad7-e7c1000d3ad7 eth0: Data path switched from VF: enP35107s1 Feb 9 19:04:51.725887 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:04:51.726019 systemd[1]: Stopped network-cleanup.service. Feb 9 19:04:51.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:51.900937 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:04:52.324917 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:04:52.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:52.325061 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:04:52.327709 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:04:52.334982 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:04:52.335127 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:04:52.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:52.342056 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:04:52.353214 systemd[1]: Switching root. Feb 9 19:04:52.381853 iscsid[811]: iscsid shutting down. Feb 9 19:04:52.383673 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Feb 9 19:04:52.383745 systemd-journald[183]: Journal stopped Feb 9 19:05:03.295895 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:05:03.295923 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:05:03.295936 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:05:03.295945 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:05:03.295955 kernel: SELinux: policy capability open_perms=1 Feb 9 19:05:03.295965 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:05:03.295977 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:05:03.295990 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:05:03.295998 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:05:03.296009 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:05:03.296023 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:05:03.296033 systemd[1]: Successfully loaded SELinux policy in 227.312ms. Feb 9 19:05:03.296046 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.951ms. Feb 9 19:05:03.296060 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:05:03.296074 systemd[1]: Detected virtualization microsoft. Feb 9 19:05:03.296084 systemd[1]: Detected architecture x86-64. Feb 9 19:05:03.296095 systemd[1]: Detected first boot. Feb 9 19:05:03.296105 systemd[1]: Hostname set to . Feb 9 19:05:03.296117 systemd[1]: Initializing machine ID from random generator. Feb 9 19:05:03.296131 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:05:03.296140 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:05:03.296152 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:05:03.296165 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:05:03.296176 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:05:03.296187 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 9 19:05:03.296198 kernel: audit: type=1334 audit(1707505502.777:89): prog-id=12 op=LOAD Feb 9 19:05:03.296212 kernel: audit: type=1334 audit(1707505502.777:90): prog-id=3 op=UNLOAD Feb 9 19:05:03.296222 kernel: audit: type=1334 audit(1707505502.782:91): prog-id=13 op=LOAD Feb 9 19:05:03.296233 kernel: audit: type=1334 audit(1707505502.787:92): prog-id=14 op=LOAD Feb 9 19:05:03.296242 kernel: audit: type=1334 audit(1707505502.787:93): prog-id=4 op=UNLOAD Feb 9 19:05:03.296254 kernel: audit: type=1334 audit(1707505502.787:94): prog-id=5 op=UNLOAD Feb 9 19:05:03.296263 kernel: audit: type=1334 audit(1707505502.791:95): prog-id=15 op=LOAD Feb 9 19:05:03.296274 kernel: audit: type=1334 audit(1707505502.791:96): prog-id=12 op=UNLOAD Feb 9 19:05:03.296292 kernel: audit: type=1334 audit(1707505502.796:97): prog-id=16 op=LOAD Feb 9 19:05:03.296306 kernel: audit: type=1334 audit(1707505502.800:98): prog-id=17 op=LOAD Feb 9 19:05:03.296316 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:05:03.296328 systemd[1]: Stopped iscsiuio.service. Feb 9 19:05:03.296340 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:05:03.296350 systemd[1]: Stopped iscsid.service. Feb 9 19:05:03.296362 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:05:03.296377 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:05:03.296393 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:05:03.296411 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:05:03.296431 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:05:03.296449 systemd[1]: Created slice system-getty.slice. Feb 9 19:05:03.296470 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:05:03.296491 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:05:03.296516 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:05:03.296536 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:05:03.296554 systemd[1]: Created slice user.slice. Feb 9 19:05:03.296576 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:05:03.296597 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:05:03.296615 systemd[1]: Set up automount boot.automount. Feb 9 19:05:03.296633 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:05:03.296655 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:05:03.296674 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:05:03.296696 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:05:03.296907 systemd[1]: Reached target integritysetup.target. Feb 9 19:05:03.296931 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:05:03.296951 systemd[1]: Reached target remote-fs.target. Feb 9 19:05:03.296972 systemd[1]: Reached target slices.target. Feb 9 19:05:03.296993 systemd[1]: Reached target swap.target. Feb 9 19:05:03.297014 systemd[1]: Reached target torcx.target. Feb 9 19:05:03.297033 systemd[1]: Reached target veritysetup.target. Feb 9 19:05:03.297061 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:05:03.297079 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:05:03.297103 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:05:03.297122 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:05:03.297142 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:05:03.297163 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:05:03.297181 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:05:03.297201 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:05:03.297221 systemd[1]: Mounting media.mount... Feb 9 19:05:03.297253 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:05:03.297270 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:05:03.297299 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:05:03.297315 systemd[1]: Mounting tmp.mount... Feb 9 19:05:03.297329 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:05:03.297342 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:05:03.297353 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:05:03.297370 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:05:03.297383 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:05:03.297396 systemd[1]: Starting modprobe@drm.service... Feb 9 19:05:03.297409 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:05:03.297421 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:05:03.297434 systemd[1]: Starting modprobe@loop.service... Feb 9 19:05:03.297445 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:05:03.297459 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:05:03.297645 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:05:03.297661 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:05:03.297672 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:05:03.297684 systemd[1]: Stopped systemd-journald.service. Feb 9 19:05:03.297695 systemd[1]: Starting systemd-journald.service... Feb 9 19:05:03.297707 kernel: loop: module loaded Feb 9 19:05:03.297718 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:05:03.297729 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:05:03.297740 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:05:03.297751 kernel: fuse: init (API version 7.34) Feb 9 19:05:03.297765 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:05:03.297775 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:05:03.297789 systemd[1]: Stopped verity-setup.service. Feb 9 19:05:03.297802 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:05:03.297815 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:05:03.297827 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:05:03.297837 systemd[1]: Mounted media.mount. Feb 9 19:05:03.297849 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:05:03.297862 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:05:03.297876 systemd[1]: Mounted tmp.mount. Feb 9 19:05:03.297889 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:05:03.297902 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:05:03.297918 systemd-journald[1116]: Journal started Feb 9 19:05:03.297973 systemd-journald[1116]: Runtime Journal (/run/log/journal/4659bf6cd3fc460ca162b10f24dbabc8) is 8.0M, max 159.0M, 151.0M free. Feb 9 19:04:54.240000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:04:54.861000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:04:54.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:04:54.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:04:54.874000 audit: BPF prog-id=10 op=LOAD Feb 9 19:04:54.874000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:04:54.874000 audit: BPF prog-id=11 op=LOAD Feb 9 19:04:54.874000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:04:56.025000 audit[1033]: AVC avc: denied { associate } for pid=1033 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:04:56.025000 audit[1033]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:56.025000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:04:56.032000 audit[1033]: AVC avc: denied { associate } for pid=1033 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:04:56.032000 audit[1033]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:56.032000 audit: CWD cwd="/" Feb 9 19:04:56.032000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:04:56.032000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:04:56.032000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:05:02.777000 audit: BPF prog-id=12 op=LOAD Feb 9 19:05:02.777000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:05:02.782000 audit: BPF prog-id=13 op=LOAD Feb 9 19:05:02.787000 audit: BPF prog-id=14 op=LOAD Feb 9 19:05:02.787000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:05:02.787000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:05:02.791000 audit: BPF prog-id=15 op=LOAD Feb 9 19:05:02.791000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:05:02.796000 audit: BPF prog-id=16 op=LOAD Feb 9 19:05:02.800000 audit: BPF prog-id=17 op=LOAD Feb 9 19:05:02.800000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:05:02.800000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:05:02.805000 audit: BPF prog-id=18 op=LOAD Feb 9 19:05:02.805000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:05:02.823000 audit: BPF prog-id=19 op=LOAD Feb 9 19:05:02.834000 audit: BPF prog-id=20 op=LOAD Feb 9 19:05:02.834000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:05:02.834000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:05:02.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:02.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:02.849000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:05:02.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:02.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:02.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.177000 audit: BPF prog-id=21 op=LOAD Feb 9 19:05:03.177000 audit: BPF prog-id=22 op=LOAD Feb 9 19:05:03.177000 audit: BPF prog-id=23 op=LOAD Feb 9 19:05:03.177000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:05:03.177000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:05:03.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.292000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:05:03.292000 audit[1116]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff38296960 a2=4000 a3=7fff382969fc items=0 ppid=1 pid=1116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:03.292000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:05:03.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:56.012313 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:05:02.776089 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:04:56.012766 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:05:02.835671 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:04:56.012788 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:04:56.012831 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:04:56.012843 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:04:56.012898 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:04:56.012914 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:04:56.013141 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:04:56.013194 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:04:56.013212 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:04:56.013640 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:04:56.013680 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:04:56.013703 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:04:56.013720 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:04:56.013738 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:04:56.013754 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:04:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:05:01.807420 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:05:01Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:05:01.807827 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:05:01Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:05:01.807934 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:05:01Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:05:01.808112 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:05:01Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:05:01.808159 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:05:01Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:05:01.808212 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:05:01Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:05:03.304591 systemd[1]: Started systemd-journald.service. Feb 9 19:05:03.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.305548 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:05:03.305704 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:05:03.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.308083 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:05:03.308225 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:05:03.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.310698 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:05:03.310867 systemd[1]: Finished modprobe@drm.service. Feb 9 19:05:03.313334 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:05:03.313483 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:05:03.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.315766 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:05:03.315909 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:05:03.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.322991 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:05:03.323141 systemd[1]: Finished modprobe@loop.service. Feb 9 19:05:03.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.325232 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:05:03.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.327555 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:05:03.329861 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:05:03.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.332368 systemd[1]: Reached target network-pre.target. Feb 9 19:05:03.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.335537 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:05:03.338909 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:05:03.342413 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:05:03.353825 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:05:03.357052 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:05:03.359221 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:05:03.360815 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:05:03.363754 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:05:03.365477 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:05:03.368835 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:05:03.375650 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:05:03.378155 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:05:03.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.406822 systemd-journald[1116]: Time spent on flushing to /var/log/journal/4659bf6cd3fc460ca162b10f24dbabc8 is 25.657ms for 1170 entries. Feb 9 19:05:03.406822 systemd-journald[1116]: System Journal (/var/log/journal/4659bf6cd3fc460ca162b10f24dbabc8) is 8.0M, max 2.6G, 2.6G free. Feb 9 19:05:03.490161 systemd-journald[1116]: Received client request to flush runtime journal. Feb 9 19:05:03.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.401493 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:05:03.403990 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:05:03.490671 udevadm[1159]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:05:03.434573 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:05:03.439844 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:05:03.491485 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:05:03.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.506759 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:05:03.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:03.948965 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:05:03.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:04.552869 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:05:04.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:04.555000 audit: BPF prog-id=24 op=LOAD Feb 9 19:05:04.555000 audit: BPF prog-id=25 op=LOAD Feb 9 19:05:04.555000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:05:04.555000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:05:04.556665 systemd[1]: Starting systemd-udevd.service... Feb 9 19:05:04.575202 systemd-udevd[1161]: Using default interface naming scheme 'v252'. Feb 9 19:05:04.753429 systemd[1]: Started systemd-udevd.service. Feb 9 19:05:04.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:04.756000 audit: BPF prog-id=26 op=LOAD Feb 9 19:05:04.758292 systemd[1]: Starting systemd-networkd.service... Feb 9 19:05:04.791714 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:05:04.851316 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:05:04.867436 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 19:05:04.867547 kernel: hv_vmbus: registering driver hv_utils Feb 9 19:05:04.858000 audit[1177]: AVC avc: denied { confidentiality } for pid=1177 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:05:04.875295 kernel: hv_vmbus: registering driver hv_balloon Feb 9 19:05:04.876000 audit: BPF prog-id=27 op=LOAD Feb 9 19:05:04.876000 audit: BPF prog-id=28 op=LOAD Feb 9 19:05:04.876000 audit: BPF prog-id=29 op=LOAD Feb 9 19:05:04.881565 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 19:05:04.877577 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:05:04.887308 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 19:05:04.887369 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 19:05:04.892694 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 19:05:04.898489 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 19:05:04.898543 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 19:05:04.898574 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 19:05:05.692407 kernel: Console: switching to colour dummy device 80x25 Feb 9 19:05:05.694344 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 19:05:04.858000 audit[1177]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56161046c9f0 a1=f884 a2=7fe059449bc5 a3=5 items=12 ppid=1161 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:04.858000 audit: CWD cwd="/" Feb 9 19:05:04.858000 audit: PATH item=0 name=(null) inode=237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=1 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=2 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=3 name=(null) inode=15056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=4 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=5 name=(null) inode=15057 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=6 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=7 name=(null) inode=15058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=8 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=9 name=(null) inode=15059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=10 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PATH item=11 name=(null) inode=15060 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:04.858000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:05:05.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:05.743482 systemd[1]: Started systemd-userdbd.service. Feb 9 19:05:05.909395 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1176) Feb 9 19:05:05.973407 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 9 19:05:05.982733 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:05:06.022911 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:05:06.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:06.026607 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:05:06.076258 systemd-networkd[1167]: lo: Link UP Feb 9 19:05:06.076270 systemd-networkd[1167]: lo: Gained carrier Feb 9 19:05:06.076882 systemd-networkd[1167]: Enumeration completed Feb 9 19:05:06.077013 systemd[1]: Started systemd-networkd.service. Feb 9 19:05:06.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:06.080847 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:05:06.103567 systemd-networkd[1167]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:05:06.157414 kernel: mlx5_core 8923:00:02.0 enP35107s1: Link up Feb 9 19:05:06.201392 kernel: hv_netvsc 000d3ad7-e7c1-000d-3ad7-e7c1000d3ad7 eth0: Data path switched to VF: enP35107s1 Feb 9 19:05:06.203023 systemd-networkd[1167]: enP35107s1: Link UP Feb 9 19:05:06.203406 systemd-networkd[1167]: eth0: Link UP Feb 9 19:05:06.203510 systemd-networkd[1167]: eth0: Gained carrier Feb 9 19:05:06.207650 systemd-networkd[1167]: enP35107s1: Gained carrier Feb 9 19:05:06.243523 systemd-networkd[1167]: eth0: DHCPv4 address 10.200.8.43/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:05:06.357386 lvm[1238]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:05:06.382432 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:05:06.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:06.385230 systemd[1]: Reached target cryptsetup.target. Feb 9 19:05:06.388754 systemd[1]: Starting lvm2-activation.service... Feb 9 19:05:06.394691 lvm[1240]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:05:06.421506 systemd[1]: Finished lvm2-activation.service. Feb 9 19:05:06.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:06.424194 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:05:06.426517 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:05:06.426560 systemd[1]: Reached target local-fs.target. Feb 9 19:05:06.428805 systemd[1]: Reached target machines.target. Feb 9 19:05:06.431952 systemd[1]: Starting ldconfig.service... Feb 9 19:05:06.434081 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:05:06.434186 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:05:06.435348 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:05:06.438594 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:05:06.442311 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:05:06.444779 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:05:06.444866 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:05:06.446177 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:05:06.466406 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1242 (bootctl) Feb 9 19:05:06.467601 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:05:06.808726 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:05:06.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:07.045034 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:05:07.249525 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:05:07.512085 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:05:07.557837 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:05:07.558595 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:05:07.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:07.821919 systemd-fsck[1250]: fsck.fat 4.2 (2021-01-31) Feb 9 19:05:07.821919 systemd-fsck[1250]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:05:07.824354 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:05:07.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:07.828628 systemd[1]: Mounting boot.mount... Feb 9 19:05:07.840143 systemd[1]: Mounted boot.mount. Feb 9 19:05:07.853738 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:05:07.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:07.975596 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:05:07.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:07.980072 systemd[1]: Starting audit-rules.service... Feb 9 19:05:07.983881 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:05:07.987320 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:05:07.989000 audit: BPF prog-id=30 op=LOAD Feb 9 19:05:07.992200 systemd[1]: Starting systemd-resolved.service... Feb 9 19:05:07.994000 audit: BPF prog-id=31 op=LOAD Feb 9 19:05:07.997277 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:05:08.000738 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:05:08.024000 audit[1265]: SYSTEM_BOOT pid=1265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:05:08.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:08.028766 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:05:08.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:08.045036 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:05:08.047894 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:05:08.088764 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:05:08.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:08.091979 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:05:08.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:08.095358 systemd[1]: Reached target time-set.target. Feb 9 19:05:08.138631 systemd-resolved[1260]: Positive Trust Anchors: Feb 9 19:05:08.138887 systemd-resolved[1260]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:05:08.138960 systemd-resolved[1260]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:05:08.179514 systemd-networkd[1167]: eth0: Gained IPv6LL Feb 9 19:05:08.181231 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:05:08.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:08.219352 systemd-timesyncd[1261]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Feb 9 19:05:08.219501 systemd-timesyncd[1261]: Initial clock synchronization to Fri 2024-02-09 19:05:08.220471 UTC. Feb 9 19:05:08.256075 systemd-resolved[1260]: Using system hostname 'ci-3510.3.2-a-bfd6d81330'. Feb 9 19:05:08.257701 systemd[1]: Started systemd-resolved.service. Feb 9 19:05:08.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:05:08.260492 systemd[1]: Reached target network.target. Feb 9 19:05:08.262773 systemd[1]: Reached target network-online.target. Feb 9 19:05:08.265103 systemd[1]: Reached target nss-lookup.target. Feb 9 19:05:08.340000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:05:08.340000 audit[1277]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbce6cda0 a2=420 a3=0 items=0 ppid=1256 pid=1277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:08.340000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:05:08.342349 augenrules[1277]: No rules Feb 9 19:05:08.342879 systemd[1]: Finished audit-rules.service. Feb 9 19:05:12.774345 ldconfig[1241]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:05:12.783384 systemd[1]: Finished ldconfig.service. Feb 9 19:05:12.786878 systemd[1]: Starting systemd-update-done.service... Feb 9 19:05:12.795222 systemd[1]: Finished systemd-update-done.service. Feb 9 19:05:12.797563 systemd[1]: Reached target sysinit.target. Feb 9 19:05:12.799518 systemd[1]: Started motdgen.path. Feb 9 19:05:12.801237 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:05:12.803982 systemd[1]: Started logrotate.timer. Feb 9 19:05:12.805980 systemd[1]: Started mdadm.timer. Feb 9 19:05:12.807562 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:05:12.809492 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:05:12.809543 systemd[1]: Reached target paths.target. Feb 9 19:05:12.811295 systemd[1]: Reached target timers.target. Feb 9 19:05:12.813483 systemd[1]: Listening on dbus.socket. Feb 9 19:05:12.816205 systemd[1]: Starting docker.socket... Feb 9 19:05:12.820796 systemd[1]: Listening on sshd.socket. Feb 9 19:05:12.822988 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:05:12.823491 systemd[1]: Listening on docker.socket. Feb 9 19:05:12.825473 systemd[1]: Reached target sockets.target. Feb 9 19:05:12.827500 systemd[1]: Reached target basic.target. Feb 9 19:05:12.829569 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:05:12.829611 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:05:12.830668 systemd[1]: Starting containerd.service... Feb 9 19:05:12.833497 systemd[1]: Starting dbus.service... Feb 9 19:05:12.836205 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:05:12.839409 systemd[1]: Starting extend-filesystems.service... Feb 9 19:05:12.841530 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:05:12.842821 systemd[1]: Starting motdgen.service... Feb 9 19:05:12.846603 systemd[1]: Started nvidia.service. Feb 9 19:05:12.849992 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:05:12.853155 systemd[1]: Starting prepare-critools.service... Feb 9 19:05:12.856088 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:05:12.859612 systemd[1]: Starting sshd-keygen.service... Feb 9 19:05:12.867159 systemd[1]: Starting systemd-logind.service... Feb 9 19:05:12.870797 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:05:12.870879 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:05:12.871458 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:05:12.872259 systemd[1]: Starting update-engine.service... Feb 9 19:05:12.875563 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:05:12.881985 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:05:12.882203 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:05:12.909974 jq[1305]: true Feb 9 19:05:12.914528 jq[1287]: false Feb 9 19:05:12.914850 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:05:12.915072 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:05:12.929169 jq[1309]: true Feb 9 19:05:12.933457 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:05:12.933676 systemd[1]: Finished motdgen.service. Feb 9 19:05:12.973769 extend-filesystems[1288]: Found sda Feb 9 19:05:12.976063 extend-filesystems[1288]: Found sda1 Feb 9 19:05:12.976063 extend-filesystems[1288]: Found sda2 Feb 9 19:05:12.976063 extend-filesystems[1288]: Found sda3 Feb 9 19:05:12.976063 extend-filesystems[1288]: Found usr Feb 9 19:05:12.976063 extend-filesystems[1288]: Found sda4 Feb 9 19:05:12.976063 extend-filesystems[1288]: Found sda6 Feb 9 19:05:12.976063 extend-filesystems[1288]: Found sda7 Feb 9 19:05:12.976063 extend-filesystems[1288]: Found sda9 Feb 9 19:05:12.976063 extend-filesystems[1288]: Checking size of /dev/sda9 Feb 9 19:05:12.986818 systemd-logind[1301]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:05:12.991697 systemd-logind[1301]: New seat seat0. Feb 9 19:05:13.022724 tar[1307]: ./ Feb 9 19:05:13.022724 tar[1307]: ./macvlan Feb 9 19:05:13.024520 tar[1308]: crictl Feb 9 19:05:13.024766 env[1311]: time="2024-02-09T19:05:13.023690020Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:05:13.059349 extend-filesystems[1288]: Old size kept for /dev/sda9 Feb 9 19:05:13.064179 extend-filesystems[1288]: Found sr0 Feb 9 19:05:13.059984 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:05:13.060156 systemd[1]: Finished extend-filesystems.service. Feb 9 19:05:13.092491 env[1311]: time="2024-02-09T19:05:13.092432415Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:05:13.105883 env[1311]: time="2024-02-09T19:05:13.104695128Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:05:13.106334 env[1311]: time="2024-02-09T19:05:13.106298321Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:05:13.109839 env[1311]: time="2024-02-09T19:05:13.109808025Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:05:13.112648 env[1311]: time="2024-02-09T19:05:13.112616788Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:05:13.112841 env[1311]: time="2024-02-09T19:05:13.112702293Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:05:13.112841 env[1311]: time="2024-02-09T19:05:13.112726095Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:05:13.112841 env[1311]: time="2024-02-09T19:05:13.112741695Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:05:13.118424 bash[1330]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:05:13.122403 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:05:13.130545 env[1311]: time="2024-02-09T19:05:13.128012983Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:05:13.130545 env[1311]: time="2024-02-09T19:05:13.128342002Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:05:13.130545 env[1311]: time="2024-02-09T19:05:13.128559415Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:05:13.130545 env[1311]: time="2024-02-09T19:05:13.128592717Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:05:13.130545 env[1311]: time="2024-02-09T19:05:13.128659821Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:05:13.130545 env[1311]: time="2024-02-09T19:05:13.128675621Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.138793509Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.138847213Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.138879614Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.138924917Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.138947818Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.138982120Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.139005622Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.139030623Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.139051524Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.139070926Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.139090327Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.139123229Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.139259437Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:05:13.139392 env[1311]: time="2024-02-09T19:05:13.139398145Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:05:13.139904 env[1311]: time="2024-02-09T19:05:13.139750465Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:05:13.139904 env[1311]: time="2024-02-09T19:05:13.139790267Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.139904 env[1311]: time="2024-02-09T19:05:13.139812069Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:05:13.139904 env[1311]: time="2024-02-09T19:05:13.139875172Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.139904 env[1311]: time="2024-02-09T19:05:13.139894073Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140074 env[1311]: time="2024-02-09T19:05:13.139910874Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140074 env[1311]: time="2024-02-09T19:05:13.139938676Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140074 env[1311]: time="2024-02-09T19:05:13.139960577Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140074 env[1311]: time="2024-02-09T19:05:13.139985079Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140074 env[1311]: time="2024-02-09T19:05:13.140005580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140074 env[1311]: time="2024-02-09T19:05:13.140022581Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140074 env[1311]: time="2024-02-09T19:05:13.140041882Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:05:13.140313 env[1311]: time="2024-02-09T19:05:13.140205892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140313 env[1311]: time="2024-02-09T19:05:13.140234493Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140313 env[1311]: time="2024-02-09T19:05:13.140254194Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140313 env[1311]: time="2024-02-09T19:05:13.140271395Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:05:13.140313 env[1311]: time="2024-02-09T19:05:13.140292997Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:05:13.140528 env[1311]: time="2024-02-09T19:05:13.140312598Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:05:13.140528 env[1311]: time="2024-02-09T19:05:13.140337399Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:05:13.140528 env[1311]: time="2024-02-09T19:05:13.140426604Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:05:13.140789 env[1311]: time="2024-02-09T19:05:13.140718421Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.140816827Z" level=info msg="Connect containerd service" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.140896932Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.141712079Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.142051199Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.142100902Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.142412820Z" level=info msg="containerd successfully booted in 0.120490s" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.146417653Z" level=info msg="Start subscribing containerd event" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.146476756Z" level=info msg="Start recovering state" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.146559861Z" level=info msg="Start event monitor" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.146583862Z" level=info msg="Start snapshots syncer" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.146597663Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:05:13.185017 env[1311]: time="2024-02-09T19:05:13.146610364Z" level=info msg="Start streaming server" Feb 9 19:05:13.185499 tar[1307]: ./static Feb 9 19:05:13.142231 systemd[1]: Started containerd.service. Feb 9 19:05:13.191200 dbus-daemon[1286]: [system] SELinux support is enabled Feb 9 19:05:13.191411 systemd[1]: Started dbus.service. Feb 9 19:05:13.196609 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:05:13.197186 dbus-daemon[1286]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:05:13.196645 systemd[1]: Reached target system-config.target. Feb 9 19:05:13.199075 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:05:13.199097 systemd[1]: Reached target user-config.target. Feb 9 19:05:13.201290 systemd[1]: Started systemd-logind.service. Feb 9 19:05:13.304864 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 19:05:13.307830 tar[1307]: ./vlan Feb 9 19:05:13.401306 tar[1307]: ./portmap Feb 9 19:05:13.481302 tar[1307]: ./host-local Feb 9 19:05:13.548752 tar[1307]: ./vrf Feb 9 19:05:13.624652 tar[1307]: ./bridge Feb 9 19:05:13.685206 update_engine[1304]: I0209 19:05:13.684862 1304 main.cc:92] Flatcar Update Engine starting Feb 9 19:05:13.713063 tar[1307]: ./tuning Feb 9 19:05:13.722527 systemd[1]: Started update-engine.service. Feb 9 19:05:13.734986 update_engine[1304]: I0209 19:05:13.722597 1304 update_check_scheduler.cc:74] Next update check in 10m6s Feb 9 19:05:13.732223 systemd[1]: Started locksmithd.service. Feb 9 19:05:13.753037 systemd[1]: Finished prepare-critools.service. Feb 9 19:05:13.780294 tar[1307]: ./firewall Feb 9 19:05:13.825751 tar[1307]: ./host-device Feb 9 19:05:13.865506 tar[1307]: ./sbr Feb 9 19:05:13.901830 tar[1307]: ./loopback Feb 9 19:05:13.925520 sshd_keygen[1303]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:05:13.940594 tar[1307]: ./dhcp Feb 9 19:05:13.956000 systemd[1]: Finished sshd-keygen.service. Feb 9 19:05:13.959974 systemd[1]: Starting issuegen.service... Feb 9 19:05:13.963439 systemd[1]: Started waagent.service. Feb 9 19:05:13.971366 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:05:13.971607 systemd[1]: Finished issuegen.service. Feb 9 19:05:13.975544 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:05:14.003004 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:05:14.007336 systemd[1]: Started getty@tty1.service. Feb 9 19:05:14.011177 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:05:14.013606 systemd[1]: Reached target getty.target. Feb 9 19:05:14.046015 tar[1307]: ./ptp Feb 9 19:05:14.087547 tar[1307]: ./ipvlan Feb 9 19:05:14.118497 tar[1307]: ./bandwidth Feb 9 19:05:14.195648 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:05:14.199053 systemd[1]: Reached target multi-user.target. Feb 9 19:05:14.203341 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:05:14.214022 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:05:14.214213 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:05:14.217808 systemd[1]: Startup finished in 913ms (firmware) + 22.776s (loader) + 898ms (kernel) + 14.042s (initrd) + 19.666s (userspace) = 58.296s. Feb 9 19:05:14.606356 login[1402]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:05:14.607848 login[1403]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:05:14.628977 systemd[1]: Created slice user-500.slice. Feb 9 19:05:14.630898 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:05:14.634972 systemd-logind[1301]: New session 2 of user core. Feb 9 19:05:14.641316 systemd-logind[1301]: New session 1 of user core. Feb 9 19:05:14.645347 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:05:14.646815 systemd[1]: Starting user@500.service... Feb 9 19:05:14.662303 (systemd)[1411]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:05:14.776174 systemd[1411]: Queued start job for default target default.target. Feb 9 19:05:14.776836 systemd[1411]: Reached target paths.target. Feb 9 19:05:14.776867 systemd[1411]: Reached target sockets.target. Feb 9 19:05:14.776883 systemd[1411]: Reached target timers.target. Feb 9 19:05:14.776898 systemd[1411]: Reached target basic.target. Feb 9 19:05:14.776955 systemd[1411]: Reached target default.target. Feb 9 19:05:14.776993 systemd[1411]: Startup finished in 108ms. Feb 9 19:05:14.777038 systemd[1]: Started user@500.service. Feb 9 19:05:14.778302 systemd[1]: Started session-1.scope. Feb 9 19:05:14.778914 systemd[1]: Started session-2.scope. Feb 9 19:05:15.019986 locksmithd[1387]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:05:19.940855 waagent[1397]: 2024-02-09T19:05:19.940732Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 19:05:19.945145 waagent[1397]: 2024-02-09T19:05:19.945066Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 19:05:19.947670 waagent[1397]: 2024-02-09T19:05:19.947609Z INFO Daemon Daemon Python: 3.9.16 Feb 9 19:05:19.950065 waagent[1397]: 2024-02-09T19:05:19.949995Z INFO Daemon Daemon Run daemon Feb 9 19:05:19.952256 waagent[1397]: 2024-02-09T19:05:19.952197Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 19:05:19.964839 waagent[1397]: 2024-02-09T19:05:19.964726Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 19:05:19.971436 waagent[1397]: 2024-02-09T19:05:19.971320Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.972654Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.973360Z INFO Daemon Daemon Using waagent for provisioning Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.974320Z INFO Daemon Daemon Activate resource disk Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.974982Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.982777Z INFO Daemon Daemon Found device: None Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.983620Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.984456Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.986067Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 19:05:20.000175 waagent[1397]: 2024-02-09T19:05:19.986862Z INFO Daemon Daemon Running default provisioning handler Feb 9 19:05:20.002794 waagent[1397]: 2024-02-09T19:05:20.002681Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 19:05:20.008849 waagent[1397]: 2024-02-09T19:05:20.008745Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 19:05:20.016445 waagent[1397]: 2024-02-09T19:05:20.010014Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 19:05:20.016445 waagent[1397]: 2024-02-09T19:05:20.010750Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 19:05:20.098693 waagent[1397]: 2024-02-09T19:05:20.098517Z INFO Daemon Daemon Successfully mounted dvd Feb 9 19:05:20.216596 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 19:05:20.259749 waagent[1397]: 2024-02-09T19:05:20.259569Z INFO Daemon Daemon Detect protocol endpoint Feb 9 19:05:20.262672 waagent[1397]: 2024-02-09T19:05:20.262586Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 19:05:20.265495 waagent[1397]: 2024-02-09T19:05:20.265422Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 19:05:20.268487 waagent[1397]: 2024-02-09T19:05:20.268425Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 19:05:20.271067 waagent[1397]: 2024-02-09T19:05:20.270999Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 19:05:20.273626 waagent[1397]: 2024-02-09T19:05:20.273562Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 19:05:20.368844 waagent[1397]: 2024-02-09T19:05:20.368762Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 19:05:20.376081 waagent[1397]: 2024-02-09T19:05:20.370656Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 19:05:20.376081 waagent[1397]: 2024-02-09T19:05:20.371277Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 19:05:20.824668 waagent[1397]: 2024-02-09T19:05:20.824511Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 19:05:20.835525 waagent[1397]: 2024-02-09T19:05:20.835444Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 19:05:20.840254 waagent[1397]: 2024-02-09T19:05:20.836737Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 19:05:20.918277 waagent[1397]: 2024-02-09T19:05:20.918138Z INFO Daemon Daemon Found private key matching thumbprint 04B76A1F1FFD6C34C8D59C5B9479BF25D93F9FB0 Feb 9 19:05:20.922193 waagent[1397]: 2024-02-09T19:05:20.922111Z INFO Daemon Daemon Certificate with thumbprint D36D5C0E3528C74C2A663CABC831B389FE7E1C07 has no matching private key. Feb 9 19:05:20.926590 waagent[1397]: 2024-02-09T19:05:20.926519Z INFO Daemon Daemon Fetch goal state completed Feb 9 19:05:20.970059 waagent[1397]: 2024-02-09T19:05:20.969960Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: da67da91-94d5-4397-aea0-f0f1c0b00aeb New eTag: 12596636690656486030] Feb 9 19:05:20.976214 waagent[1397]: 2024-02-09T19:05:20.976116Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 19:05:20.990338 waagent[1397]: 2024-02-09T19:05:20.990263Z INFO Daemon Daemon Starting provisioning Feb 9 19:05:20.993034 waagent[1397]: 2024-02-09T19:05:20.992961Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 19:05:20.995229 waagent[1397]: 2024-02-09T19:05:20.995164Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-bfd6d81330] Feb 9 19:05:21.016673 waagent[1397]: 2024-02-09T19:05:21.016547Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-bfd6d81330] Feb 9 19:05:21.019797 waagent[1397]: 2024-02-09T19:05:21.019717Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 19:05:21.022886 waagent[1397]: 2024-02-09T19:05:21.022824Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 19:05:21.037357 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 19:05:21.037635 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 19:05:21.037713 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 19:05:21.038073 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:05:21.043425 systemd-networkd[1167]: eth0: DHCPv6 lease lost Feb 9 19:05:21.044851 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:05:21.045065 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:05:21.047689 systemd[1]: Starting systemd-networkd.service... Feb 9 19:05:21.078220 systemd-networkd[1452]: enP35107s1: Link UP Feb 9 19:05:21.078230 systemd-networkd[1452]: enP35107s1: Gained carrier Feb 9 19:05:21.079635 systemd-networkd[1452]: eth0: Link UP Feb 9 19:05:21.079643 systemd-networkd[1452]: eth0: Gained carrier Feb 9 19:05:21.080070 systemd-networkd[1452]: lo: Link UP Feb 9 19:05:21.080079 systemd-networkd[1452]: lo: Gained carrier Feb 9 19:05:21.080478 systemd-networkd[1452]: eth0: Gained IPv6LL Feb 9 19:05:21.080852 systemd-networkd[1452]: Enumeration completed Feb 9 19:05:21.081025 systemd[1]: Started systemd-networkd.service. Feb 9 19:05:21.086146 waagent[1397]: 2024-02-09T19:05:21.082401Z INFO Daemon Daemon Create user account if not exists Feb 9 19:05:21.086146 waagent[1397]: 2024-02-09T19:05:21.084160Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 19:05:21.086146 waagent[1397]: 2024-02-09T19:05:21.084946Z INFO Daemon Daemon Configure sudoer Feb 9 19:05:21.086514 waagent[1397]: 2024-02-09T19:05:21.086457Z INFO Daemon Daemon Configure sshd Feb 9 19:05:21.087419 waagent[1397]: 2024-02-09T19:05:21.087357Z INFO Daemon Daemon Deploy ssh public key. Feb 9 19:05:21.092342 systemd-networkd[1452]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:05:21.094780 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:05:21.140445 systemd-networkd[1452]: eth0: DHCPv4 address 10.200.8.43/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:05:21.143531 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:05:51.383632 waagent[1397]: 2024-02-09T19:05:51.383525Z INFO Daemon Daemon Provisioning complete Feb 9 19:05:51.403204 waagent[1397]: 2024-02-09T19:05:51.403120Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 19:05:51.406392 waagent[1397]: 2024-02-09T19:05:51.406319Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 19:05:51.411433 waagent[1397]: 2024-02-09T19:05:51.411344Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 19:05:51.678910 waagent[1461]: 2024-02-09T19:05:51.678714Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 19:05:51.679665 waagent[1461]: 2024-02-09T19:05:51.679597Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:05:51.679814 waagent[1461]: 2024-02-09T19:05:51.679759Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:05:51.691269 waagent[1461]: 2024-02-09T19:05:51.691185Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 19:05:51.691454 waagent[1461]: 2024-02-09T19:05:51.691396Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 19:05:51.756160 waagent[1461]: 2024-02-09T19:05:51.756031Z INFO ExtHandler ExtHandler Found private key matching thumbprint 04B76A1F1FFD6C34C8D59C5B9479BF25D93F9FB0 Feb 9 19:05:51.756406 waagent[1461]: 2024-02-09T19:05:51.756328Z INFO ExtHandler ExtHandler Certificate with thumbprint D36D5C0E3528C74C2A663CABC831B389FE7E1C07 has no matching private key. Feb 9 19:05:51.756658 waagent[1461]: 2024-02-09T19:05:51.756606Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 19:05:51.774932 waagent[1461]: 2024-02-09T19:05:51.774864Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 0b38efe8-e527-4f43-a52e-73d0ff3f76d7 New eTag: 12596636690656486030] Feb 9 19:05:51.775558 waagent[1461]: 2024-02-09T19:05:51.775499Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 19:05:51.877174 waagent[1461]: 2024-02-09T19:05:51.876997Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 19:05:51.921716 waagent[1461]: 2024-02-09T19:05:51.921606Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1461 Feb 9 19:05:51.925242 waagent[1461]: 2024-02-09T19:05:51.925165Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 19:05:51.926512 waagent[1461]: 2024-02-09T19:05:51.926453Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 19:05:52.013348 waagent[1461]: 2024-02-09T19:05:52.013277Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 19:05:52.013818 waagent[1461]: 2024-02-09T19:05:52.013745Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 19:05:52.021987 waagent[1461]: 2024-02-09T19:05:52.021933Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 19:05:52.022478 waagent[1461]: 2024-02-09T19:05:52.022421Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 19:05:52.023530 waagent[1461]: 2024-02-09T19:05:52.023472Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 19:05:52.024809 waagent[1461]: 2024-02-09T19:05:52.024751Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 19:05:52.025067 waagent[1461]: 2024-02-09T19:05:52.025012Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:05:52.025771 waagent[1461]: 2024-02-09T19:05:52.025714Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 19:05:52.025950 waagent[1461]: 2024-02-09T19:05:52.025883Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:05:52.026776 waagent[1461]: 2024-02-09T19:05:52.026719Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 19:05:52.027501 waagent[1461]: 2024-02-09T19:05:52.027446Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 19:05:52.027721 waagent[1461]: 2024-02-09T19:05:52.027665Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:05:52.027905 waagent[1461]: 2024-02-09T19:05:52.027857Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:05:52.028654 waagent[1461]: 2024-02-09T19:05:52.028574Z INFO EnvHandler ExtHandler Configure routes Feb 9 19:05:52.028972 waagent[1461]: 2024-02-09T19:05:52.028911Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 19:05:52.029348 waagent[1461]: 2024-02-09T19:05:52.029295Z INFO EnvHandler ExtHandler Gateway:None Feb 9 19:05:52.029555 waagent[1461]: 2024-02-09T19:05:52.029501Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 19:05:52.029555 waagent[1461]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 19:05:52.029555 waagent[1461]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 19:05:52.029555 waagent[1461]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 19:05:52.029555 waagent[1461]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:05:52.029555 waagent[1461]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:05:52.029555 waagent[1461]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:05:52.029973 waagent[1461]: 2024-02-09T19:05:52.029924Z INFO EnvHandler ExtHandler Routes:None Feb 9 19:05:52.034358 waagent[1461]: 2024-02-09T19:05:52.034298Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 19:05:52.034464 waagent[1461]: 2024-02-09T19:05:52.034406Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 19:05:52.035532 waagent[1461]: 2024-02-09T19:05:52.035480Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 19:05:52.044271 waagent[1461]: 2024-02-09T19:05:52.044199Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 19:05:52.044866 waagent[1461]: 2024-02-09T19:05:52.044815Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 19:05:52.045814 waagent[1461]: 2024-02-09T19:05:52.045759Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 19:05:52.062451 waagent[1461]: 2024-02-09T19:05:52.062312Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1452' Feb 9 19:05:52.127789 waagent[1461]: 2024-02-09T19:05:52.127709Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 19:05:52.144418 waagent[1461]: 2024-02-09T19:05:52.144298Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 19:05:52.144418 waagent[1461]: Executing ['ip', '-a', '-o', 'link']: Feb 9 19:05:52.144418 waagent[1461]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 19:05:52.144418 waagent[1461]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d7:e7:c1 brd ff:ff:ff:ff:ff:ff Feb 9 19:05:52.144418 waagent[1461]: 3: enP35107s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d7:e7:c1 brd ff:ff:ff:ff:ff:ff\ altname enP35107p0s2 Feb 9 19:05:52.144418 waagent[1461]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 19:05:52.144418 waagent[1461]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 19:05:52.144418 waagent[1461]: 2: eth0 inet 10.200.8.43/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 19:05:52.144418 waagent[1461]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 19:05:52.144418 waagent[1461]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 19:05:52.144418 waagent[1461]: 2: eth0 inet6 fe80::20d:3aff:fed7:e7c1/64 scope link \ valid_lft forever preferred_lft forever Feb 9 19:05:52.371130 waagent[1461]: 2024-02-09T19:05:52.370998Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 19:05:52.415035 waagent[1397]: 2024-02-09T19:05:52.414896Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 19:05:52.420178 waagent[1397]: 2024-02-09T19:05:52.420115Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 19:05:53.426926 waagent[1497]: 2024-02-09T19:05:53.426808Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 19:05:53.427693 waagent[1497]: 2024-02-09T19:05:53.427621Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 19:05:53.427841 waagent[1497]: 2024-02-09T19:05:53.427786Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 19:05:53.437531 waagent[1497]: 2024-02-09T19:05:53.437425Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 19:05:53.437919 waagent[1497]: 2024-02-09T19:05:53.437861Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:05:53.438085 waagent[1497]: 2024-02-09T19:05:53.438034Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:05:53.450917 waagent[1497]: 2024-02-09T19:05:53.450853Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 19:05:53.460312 waagent[1497]: 2024-02-09T19:05:53.460251Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 19:05:53.461225 waagent[1497]: 2024-02-09T19:05:53.461164Z INFO ExtHandler Feb 9 19:05:53.461380 waagent[1497]: 2024-02-09T19:05:53.461317Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 271a975f-91f1-47b5-9c83-91d47f4dbfe2 eTag: 12596636690656486030 source: Fabric] Feb 9 19:05:53.462061 waagent[1497]: 2024-02-09T19:05:53.462004Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 19:05:53.463132 waagent[1497]: 2024-02-09T19:05:53.463072Z INFO ExtHandler Feb 9 19:05:53.463266 waagent[1497]: 2024-02-09T19:05:53.463213Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 19:05:53.469703 waagent[1497]: 2024-02-09T19:05:53.469651Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 19:05:53.470124 waagent[1497]: 2024-02-09T19:05:53.470076Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 19:05:53.493169 waagent[1497]: 2024-02-09T19:05:53.493107Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 19:05:53.558111 waagent[1497]: 2024-02-09T19:05:53.557971Z INFO ExtHandler Downloaded certificate {'thumbprint': 'D36D5C0E3528C74C2A663CABC831B389FE7E1C07', 'hasPrivateKey': False} Feb 9 19:05:53.559093 waagent[1497]: 2024-02-09T19:05:53.559025Z INFO ExtHandler Downloaded certificate {'thumbprint': '04B76A1F1FFD6C34C8D59C5B9479BF25D93F9FB0', 'hasPrivateKey': True} Feb 9 19:05:53.560057 waagent[1497]: 2024-02-09T19:05:53.559996Z INFO ExtHandler Fetch goal state completed Feb 9 19:05:53.584128 waagent[1497]: 2024-02-09T19:05:53.584054Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1497 Feb 9 19:05:53.587336 waagent[1497]: 2024-02-09T19:05:53.587273Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 19:05:53.588764 waagent[1497]: 2024-02-09T19:05:53.588707Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 19:05:53.593498 waagent[1497]: 2024-02-09T19:05:53.593443Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 19:05:53.593844 waagent[1497]: 2024-02-09T19:05:53.593789Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 19:05:53.601813 waagent[1497]: 2024-02-09T19:05:53.601759Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 19:05:53.602261 waagent[1497]: 2024-02-09T19:05:53.602205Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 19:05:53.608138 waagent[1497]: 2024-02-09T19:05:53.608042Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 19:05:53.612720 waagent[1497]: 2024-02-09T19:05:53.612662Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 19:05:53.614086 waagent[1497]: 2024-02-09T19:05:53.614027Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 19:05:53.614668 waagent[1497]: 2024-02-09T19:05:53.614613Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:05:53.614828 waagent[1497]: 2024-02-09T19:05:53.614779Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:05:53.615363 waagent[1497]: 2024-02-09T19:05:53.615305Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 19:05:53.615658 waagent[1497]: 2024-02-09T19:05:53.615604Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 19:05:53.615658 waagent[1497]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 19:05:53.615658 waagent[1497]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 19:05:53.615658 waagent[1497]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 19:05:53.615658 waagent[1497]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:05:53.615658 waagent[1497]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:05:53.615658 waagent[1497]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:05:53.618600 waagent[1497]: 2024-02-09T19:05:53.618510Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:05:53.618815 waagent[1497]: 2024-02-09T19:05:53.618750Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 19:05:53.619682 waagent[1497]: 2024-02-09T19:05:53.619626Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:05:53.621627 waagent[1497]: 2024-02-09T19:05:53.621492Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 19:05:53.621873 waagent[1497]: 2024-02-09T19:05:53.621816Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 19:05:53.623281 waagent[1497]: 2024-02-09T19:05:53.623224Z INFO EnvHandler ExtHandler Configure routes Feb 9 19:05:53.623351 waagent[1497]: 2024-02-09T19:05:53.622847Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 19:05:53.623625 waagent[1497]: 2024-02-09T19:05:53.623566Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 19:05:53.624169 waagent[1497]: 2024-02-09T19:05:53.624116Z INFO EnvHandler ExtHandler Gateway:None Feb 9 19:05:53.627089 waagent[1497]: 2024-02-09T19:05:53.626981Z INFO EnvHandler ExtHandler Routes:None Feb 9 19:05:53.628606 waagent[1497]: 2024-02-09T19:05:53.628547Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 19:05:53.628606 waagent[1497]: Executing ['ip', '-a', '-o', 'link']: Feb 9 19:05:53.628606 waagent[1497]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 19:05:53.628606 waagent[1497]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d7:e7:c1 brd ff:ff:ff:ff:ff:ff Feb 9 19:05:53.628606 waagent[1497]: 3: enP35107s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d7:e7:c1 brd ff:ff:ff:ff:ff:ff\ altname enP35107p0s2 Feb 9 19:05:53.628606 waagent[1497]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 19:05:53.628606 waagent[1497]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 19:05:53.628606 waagent[1497]: 2: eth0 inet 10.200.8.43/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 19:05:53.628606 waagent[1497]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 19:05:53.628606 waagent[1497]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 19:05:53.628606 waagent[1497]: 2: eth0 inet6 fe80::20d:3aff:fed7:e7c1/64 scope link \ valid_lft forever preferred_lft forever Feb 9 19:05:53.629134 waagent[1497]: 2024-02-09T19:05:53.629079Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 19:05:53.644967 waagent[1497]: 2024-02-09T19:05:53.644894Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 19:05:53.646591 waagent[1497]: 2024-02-09T19:05:53.646531Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 19:05:53.703738 waagent[1497]: 2024-02-09T19:05:53.703620Z INFO ExtHandler ExtHandler Feb 9 19:05:53.704071 waagent[1497]: 2024-02-09T19:05:53.704011Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 135fffe2-ea6c-46b6-b753-47450ded8a45 correlation e0119372-3135-441a-8a19-0fb13f4d72fe created: 2024-02-09T19:04:04.733719Z] Feb 9 19:05:53.706657 waagent[1497]: 2024-02-09T19:05:53.706596Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 19:05:53.715893 waagent[1497]: 2024-02-09T19:05:53.715803Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 12 ms] Feb 9 19:05:53.746725 waagent[1497]: 2024-02-09T19:05:53.746643Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 19:05:53.751121 waagent[1497]: 2024-02-09T19:05:53.750989Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 19:05:53.751121 waagent[1497]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:05:53.751121 waagent[1497]: pkts bytes target prot opt in out source destination Feb 9 19:05:53.751121 waagent[1497]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:05:53.751121 waagent[1497]: pkts bytes target prot opt in out source destination Feb 9 19:05:53.751121 waagent[1497]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:05:53.751121 waagent[1497]: pkts bytes target prot opt in out source destination Feb 9 19:05:53.751121 waagent[1497]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 19:05:53.751121 waagent[1497]: 1 52 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 19:05:53.751121 waagent[1497]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 19:05:53.763663 waagent[1497]: 2024-02-09T19:05:53.763296Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 0A930894-F3E3-426C-9A4C-6CC5B542D850;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 19:05:53.765678 waagent[1497]: 2024-02-09T19:05:53.765606Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 19:05:53.765678 waagent[1497]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:05:53.765678 waagent[1497]: pkts bytes target prot opt in out source destination Feb 9 19:05:53.765678 waagent[1497]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:05:53.765678 waagent[1497]: pkts bytes target prot opt in out source destination Feb 9 19:05:53.765678 waagent[1497]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:05:53.765678 waagent[1497]: pkts bytes target prot opt in out source destination Feb 9 19:05:53.765678 waagent[1497]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 19:05:53.765678 waagent[1497]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 19:05:53.765678 waagent[1497]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 19:05:53.766175 waagent[1497]: 2024-02-09T19:05:53.766118Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 19:05:53.799307 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 9 19:05:58.648943 update_engine[1304]: I0209 19:05:58.648854 1304 update_attempter.cc:509] Updating boot flags... Feb 9 19:06:42.429696 systemd[1]: Created slice system-sshd.slice. Feb 9 19:06:42.431638 systemd[1]: Started sshd@0-10.200.8.43:22-10.200.12.6:37274.service. Feb 9 19:06:43.278681 sshd[1587]: Accepted publickey for core from 10.200.12.6 port 37274 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:06:43.280468 sshd[1587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:06:43.285004 systemd-logind[1301]: New session 3 of user core. Feb 9 19:06:43.286027 systemd[1]: Started session-3.scope. Feb 9 19:06:43.813530 systemd[1]: Started sshd@1-10.200.8.43:22-10.200.12.6:37282.service. Feb 9 19:06:44.430773 sshd[1592]: Accepted publickey for core from 10.200.12.6 port 37282 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:06:44.432500 sshd[1592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:06:44.437908 systemd[1]: Started session-4.scope. Feb 9 19:06:44.438521 systemd-logind[1301]: New session 4 of user core. Feb 9 19:06:44.871163 sshd[1592]: pam_unix(sshd:session): session closed for user core Feb 9 19:06:44.874714 systemd[1]: sshd@1-10.200.8.43:22-10.200.12.6:37282.service: Deactivated successfully. Feb 9 19:06:44.875813 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:06:44.876653 systemd-logind[1301]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:06:44.877568 systemd-logind[1301]: Removed session 4. Feb 9 19:06:44.977015 systemd[1]: Started sshd@2-10.200.8.43:22-10.200.12.6:37296.service. Feb 9 19:06:45.595413 sshd[1598]: Accepted publickey for core from 10.200.12.6 port 37296 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:06:45.597118 sshd[1598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:06:45.602731 systemd[1]: Started session-5.scope. Feb 9 19:06:45.603174 systemd-logind[1301]: New session 5 of user core. Feb 9 19:06:46.030590 sshd[1598]: pam_unix(sshd:session): session closed for user core Feb 9 19:06:46.034137 systemd[1]: sshd@2-10.200.8.43:22-10.200.12.6:37296.service: Deactivated successfully. Feb 9 19:06:46.035169 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:06:46.035995 systemd-logind[1301]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:06:46.036917 systemd-logind[1301]: Removed session 5. Feb 9 19:06:46.135837 systemd[1]: Started sshd@3-10.200.8.43:22-10.200.12.6:37302.service. Feb 9 19:06:46.764411 sshd[1604]: Accepted publickey for core from 10.200.12.6 port 37302 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:06:46.766162 sshd[1604]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:06:46.771724 systemd[1]: Started session-6.scope. Feb 9 19:06:46.772311 systemd-logind[1301]: New session 6 of user core. Feb 9 19:06:47.204818 sshd[1604]: pam_unix(sshd:session): session closed for user core Feb 9 19:06:47.208517 systemd[1]: sshd@3-10.200.8.43:22-10.200.12.6:37302.service: Deactivated successfully. Feb 9 19:06:47.209588 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:06:47.210347 systemd-logind[1301]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:06:47.211287 systemd-logind[1301]: Removed session 6. Feb 9 19:06:47.313101 systemd[1]: Started sshd@4-10.200.8.43:22-10.200.12.6:33824.service. Feb 9 19:06:47.930073 sshd[1610]: Accepted publickey for core from 10.200.12.6 port 33824 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:06:47.934666 sshd[1610]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:06:47.939999 systemd[1]: Started session-7.scope. Feb 9 19:06:47.940611 systemd-logind[1301]: New session 7 of user core. Feb 9 19:06:48.546182 sudo[1613]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:06:48.546552 sudo[1613]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:06:48.567636 dbus-daemon[1286]: \xd0m0'\u0005V: received setenforce notice (enforcing=623489360) Feb 9 19:06:48.569853 sudo[1613]: pam_unix(sudo:session): session closed for user root Feb 9 19:06:48.722911 sshd[1610]: pam_unix(sshd:session): session closed for user core Feb 9 19:06:48.726427 systemd[1]: sshd@4-10.200.8.43:22-10.200.12.6:33824.service: Deactivated successfully. Feb 9 19:06:48.727397 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:06:48.728032 systemd-logind[1301]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:06:48.728863 systemd-logind[1301]: Removed session 7. Feb 9 19:06:48.828443 systemd[1]: Started sshd@5-10.200.8.43:22-10.200.12.6:33836.service. Feb 9 19:06:49.590429 sshd[1617]: Accepted publickey for core from 10.200.12.6 port 33836 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:06:49.592192 sshd[1617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:06:49.597255 systemd[1]: Started session-8.scope. Feb 9 19:06:49.597786 systemd-logind[1301]: New session 8 of user core. Feb 9 19:06:49.964890 sudo[1621]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:06:49.965166 sudo[1621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:06:49.967980 sudo[1621]: pam_unix(sudo:session): session closed for user root Feb 9 19:06:49.972597 sudo[1620]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:06:49.972860 sudo[1620]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:06:49.981928 systemd[1]: Stopping audit-rules.service... Feb 9 19:06:49.983000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:06:49.986642 kernel: kauditd_printk_skb: 98 callbacks suppressed Feb 9 19:06:49.986702 kernel: audit: type=1305 audit(1707505609.983:178): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:06:49.990536 auditctl[1624]: No rules Feb 9 19:06:49.990981 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:06:49.991148 systemd[1]: Stopped audit-rules.service. Feb 9 19:06:49.994733 systemd[1]: Starting audit-rules.service... Feb 9 19:06:49.983000 audit[1624]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcfaf36510 a2=420 a3=0 items=0 ppid=1 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:50.009472 kernel: audit: type=1300 audit(1707505609.983:178): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcfaf36510 a2=420 a3=0 items=0 ppid=1 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:49.983000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:06:49.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.019496 augenrules[1641]: No rules Feb 9 19:06:50.019934 systemd[1]: Finished audit-rules.service. Feb 9 19:06:50.022169 sudo[1620]: pam_unix(sudo:session): session closed for user root Feb 9 19:06:50.024237 kernel: audit: type=1327 audit(1707505609.983:178): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:06:50.024296 kernel: audit: type=1131 audit(1707505609.990:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.024320 kernel: audit: type=1130 audit(1707505610.019:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.034392 kernel: audit: type=1106 audit(1707505610.019:181): pid=1620 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.019000 audit[1620]: USER_END pid=1620 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.019000 audit[1620]: CRED_DISP pid=1620 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.059392 kernel: audit: type=1104 audit(1707505610.019:182): pid=1620 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.124467 sshd[1617]: pam_unix(sshd:session): session closed for user core Feb 9 19:06:50.125000 audit[1617]: USER_END pid=1617 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:06:50.128063 systemd[1]: sshd@5-10.200.8.43:22-10.200.12.6:33836.service: Deactivated successfully. Feb 9 19:06:50.129146 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:06:50.130774 systemd-logind[1301]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:06:50.131916 systemd-logind[1301]: Removed session 8. Feb 9 19:06:50.125000 audit[1617]: CRED_DISP pid=1617 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:06:50.152763 kernel: audit: type=1106 audit(1707505610.125:183): pid=1617 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:06:50.152847 kernel: audit: type=1104 audit(1707505610.125:184): pid=1617 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:06:50.152878 kernel: audit: type=1131 audit(1707505610.127:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.43:22-10.200.12.6:33836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.43:22-10.200.12.6:33836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:50.264330 systemd[1]: Started sshd@6-10.200.8.43:22-10.200.12.6:33852.service. Feb 9 19:06:50.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.43:22-10.200.12.6:33852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:51.097000 audit[1647]: USER_ACCT pid=1647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:06:51.098411 sshd[1647]: Accepted publickey for core from 10.200.12.6 port 33852 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:06:51.099000 audit[1647]: CRED_ACQ pid=1647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:06:51.099000 audit[1647]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad8439d0 a2=3 a3=0 items=0 ppid=1 pid=1647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:51.099000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:06:51.100115 sshd[1647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:06:51.105827 systemd[1]: Started session-9.scope. Feb 9 19:06:51.106267 systemd-logind[1301]: New session 9 of user core. Feb 9 19:06:51.110000 audit[1647]: USER_START pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:06:51.111000 audit[1649]: CRED_ACQ pid=1649 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:06:51.468000 audit[1650]: USER_ACCT pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:06:51.468000 audit[1650]: CRED_REFR pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:06:51.469023 sudo[1650]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:06:51.469298 sudo[1650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:06:51.470000 audit[1650]: USER_START pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:06:52.191846 systemd[1]: Reloading. Feb 9 19:06:52.279023 /usr/lib/systemd/system-generators/torcx-generator[1680]: time="2024-02-09T19:06:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:06:52.279060 /usr/lib/systemd/system-generators/torcx-generator[1680]: time="2024-02-09T19:06:52Z" level=info msg="torcx already run" Feb 9 19:06:52.358068 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:06:52.358089 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:06:52.374321 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.442000 audit: BPF prog-id=38 op=LOAD Feb 9 19:06:52.442000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:06:52.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit: BPF prog-id=39 op=LOAD Feb 9 19:06:52.445000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit: BPF prog-id=40 op=LOAD Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.445000 audit: BPF prog-id=41 op=LOAD Feb 9 19:06:52.445000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:06:52.445000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.446000 audit: BPF prog-id=42 op=LOAD Feb 9 19:06:52.446000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.448000 audit: BPF prog-id=43 op=LOAD Feb 9 19:06:52.448000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit: BPF prog-id=44 op=LOAD Feb 9 19:06:52.450000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit: BPF prog-id=45 op=LOAD Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.450000 audit: BPF prog-id=46 op=LOAD Feb 9 19:06:52.450000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:06:52.450000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit: BPF prog-id=47 op=LOAD Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.451000 audit: BPF prog-id=48 op=LOAD Feb 9 19:06:52.451000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:06:52.451000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit: BPF prog-id=49 op=LOAD Feb 9 19:06:52.453000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit: BPF prog-id=50 op=LOAD Feb 9 19:06:52.454000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit: BPF prog-id=51 op=LOAD Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:52.454000 audit: BPF prog-id=52 op=LOAD Feb 9 19:06:52.454000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:06:52.454000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:06:52.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:52.466771 systemd[1]: Started kubelet.service. Feb 9 19:06:52.494532 systemd[1]: Starting coreos-metadata.service... Feb 9 19:06:52.551453 kubelet[1741]: E0209 19:06:52.551329 1741 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:06:52.554230 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:06:52.554423 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:06:52.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:06:52.558321 coreos-metadata[1748]: Feb 09 19:06:52.558 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 19:06:52.560917 coreos-metadata[1748]: Feb 09 19:06:52.560 INFO Fetch successful Feb 9 19:06:52.561008 coreos-metadata[1748]: Feb 09 19:06:52.560 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 9 19:06:52.562666 coreos-metadata[1748]: Feb 09 19:06:52.562 INFO Fetch successful Feb 9 19:06:52.562666 coreos-metadata[1748]: Feb 09 19:06:52.562 INFO Fetching http://168.63.129.16/machine/81fc075b-27e9-4714-bd85-4a048fef49f2/db19481a%2Db8c0%2D486f%2Da593%2Dc6ee6bc18336.%5Fci%2D3510.3.2%2Da%2Dbfd6d81330?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 9 19:06:52.564345 coreos-metadata[1748]: Feb 09 19:06:52.564 INFO Fetch successful Feb 9 19:06:52.596225 coreos-metadata[1748]: Feb 09 19:06:52.596 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 9 19:06:52.610912 coreos-metadata[1748]: Feb 09 19:06:52.610 INFO Fetch successful Feb 9 19:06:52.620056 systemd[1]: Finished coreos-metadata.service. Feb 9 19:06:52.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:55.712899 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 9 19:06:55.713028 kernel: audit: type=1130 audit(1707505615.706:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:55.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:55.707943 systemd[1]: Stopped kubelet.service. Feb 9 19:06:55.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:55.731912 kernel: audit: type=1131 audit(1707505615.710:371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:55.741144 systemd[1]: Reloading. Feb 9 19:06:55.819023 /usr/lib/systemd/system-generators/torcx-generator[1805]: time="2024-02-09T19:06:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:06:55.819068 /usr/lib/systemd/system-generators/torcx-generator[1805]: time="2024-02-09T19:06:55Z" level=info msg="torcx already run" Feb 9 19:06:55.919331 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:06:55.919352 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:06:55.935431 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.030136 kernel: audit: type=1400 audit(1707505616.003:372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.030252 kernel: audit: type=1400 audit(1707505616.003:373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.043498 kernel: audit: type=1400 audit(1707505616.003:374): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.068946 kernel: audit: type=1400 audit(1707505616.003:375): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.069078 kernel: audit: type=1400 audit(1707505616.003:376): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.089528 kernel: audit: type=1400 audit(1707505616.003:377): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit: BPF prog-id=53 op=LOAD Feb 9 19:06:56.029000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.102394 kernel: audit: type=1400 audit(1707505616.003:378): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.102432 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit: BPF prog-id=54 op=LOAD Feb 9 19:06:56.042000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit: BPF prog-id=55 op=LOAD Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit: BPF prog-id=56 op=LOAD Feb 9 19:06:56.042000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:06:56.042000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit: BPF prog-id=57 op=LOAD Feb 9 19:06:56.055000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.068000 audit: BPF prog-id=58 op=LOAD Feb 9 19:06:56.068000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:06:56.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit: BPF prog-id=59 op=LOAD Feb 9 19:06:56.104000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit: BPF prog-id=60 op=LOAD Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.105000 audit: BPF prog-id=61 op=LOAD Feb 9 19:06:56.105000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:06:56.105000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit: BPF prog-id=62 op=LOAD Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.106000 audit: BPF prog-id=63 op=LOAD Feb 9 19:06:56.106000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:06:56.106000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit: BPF prog-id=64 op=LOAD Feb 9 19:06:56.108000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit: BPF prog-id=65 op=LOAD Feb 9 19:06:56.108000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit: BPF prog-id=66 op=LOAD Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.109000 audit: BPF prog-id=67 op=LOAD Feb 9 19:06:56.109000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:06:56.109000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:06:56.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:06:56.126543 systemd[1]: Started kubelet.service. Feb 9 19:06:56.181753 kubelet[1868]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:06:56.181753 kubelet[1868]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:06:56.182185 kubelet[1868]: I0209 19:06:56.181798 1868 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:06:56.183258 kubelet[1868]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:06:56.183258 kubelet[1868]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:06:56.377777 kubelet[1868]: I0209 19:06:56.372986 1868 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:06:56.377777 kubelet[1868]: I0209 19:06:56.373016 1868 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:06:56.377777 kubelet[1868]: I0209 19:06:56.373301 1868 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:06:56.378097 kubelet[1868]: I0209 19:06:56.378067 1868 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:06:56.380588 kubelet[1868]: I0209 19:06:56.380563 1868 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:06:56.380831 kubelet[1868]: I0209 19:06:56.380812 1868 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:06:56.380911 kubelet[1868]: I0209 19:06:56.380896 1868 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:06:56.381053 kubelet[1868]: I0209 19:06:56.380926 1868 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:06:56.381053 kubelet[1868]: I0209 19:06:56.380943 1868 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:06:56.381142 kubelet[1868]: I0209 19:06:56.381074 1868 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:06:56.384426 kubelet[1868]: I0209 19:06:56.384408 1868 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:06:56.384523 kubelet[1868]: I0209 19:06:56.384431 1868 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:06:56.384523 kubelet[1868]: I0209 19:06:56.384457 1868 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:06:56.384523 kubelet[1868]: I0209 19:06:56.384475 1868 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:06:56.384996 kubelet[1868]: E0209 19:06:56.384978 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:06:56.385138 kubelet[1868]: E0209 19:06:56.385113 1868 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:06:56.385375 kubelet[1868]: I0209 19:06:56.385350 1868 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:06:56.385707 kubelet[1868]: W0209 19:06:56.385690 1868 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:06:56.386176 kubelet[1868]: I0209 19:06:56.386152 1868 server.go:1186] "Started kubelet" Feb 9 19:06:56.387250 kubelet[1868]: E0209 19:06:56.387235 1868 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:06:56.387386 kubelet[1868]: E0209 19:06:56.387357 1868 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:06:56.386000 audit[1868]: AVC avc: denied { mac_admin } for pid=1868 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.386000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:06:56.386000 audit[1868]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bce5d0 a1=c000c9e048 a2=c000bce5a0 a3=25 items=0 ppid=1 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.386000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:06:56.388548 kubelet[1868]: I0209 19:06:56.388532 1868 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:06:56.387000 audit[1868]: AVC avc: denied { mac_admin } for pid=1868 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.387000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:06:56.387000 audit[1868]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a327e0 a1=c000c9e060 a2=c000bce660 a3=25 items=0 ppid=1 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.387000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:06:56.389043 kubelet[1868]: I0209 19:06:56.389031 1868 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:06:56.389262 kubelet[1868]: I0209 19:06:56.389245 1868 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:06:56.389496 kubelet[1868]: I0209 19:06:56.389478 1868 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:06:56.390261 kubelet[1868]: I0209 19:06:56.390238 1868 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:06:56.392000 audit[1878]: NETFILTER_CFG table=mangle:8 family=2 entries=2 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.392000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcdda6c400 a2=0 a3=7ffcdda6c3ec items=0 ppid=1868 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:06:56.394467 kubelet[1868]: I0209 19:06:56.394452 1868 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:06:56.394000 audit[1879]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.394000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd8b2dda90 a2=0 a3=7ffd8b2dda7c items=0 ppid=1868 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:06:56.396774 kubelet[1868]: I0209 19:06:56.396759 1868 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:06:56.397000 audit[1881]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.397000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdcad518a0 a2=0 a3=7ffdcad5188c items=0 ppid=1868 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:06:56.400000 audit[1883]: NETFILTER_CFG table=filter:11 family=2 entries=2 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.400000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd6475290 a2=0 a3=7fffd647527c items=0 ppid=1868 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:06:56.404031 kubelet[1868]: W0209 19:06:56.404008 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:06:56.404150 kubelet[1868]: E0209 19:06:56.404041 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:06:56.404150 kubelet[1868]: W0209 19:06:56.404080 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:06:56.404150 kubelet[1868]: E0209 19:06:56.404093 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:06:56.404301 kubelet[1868]: W0209 19:06:56.404163 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:06:56.404301 kubelet[1868]: E0209 19:06:56.404176 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:06:56.404301 kubelet[1868]: E0209 19:06:56.404204 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb4adeac9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 386124489, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 386124489, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.406303 kubelet[1868]: E0209 19:06:56.406164 1868 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.200.8.43" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:06:56.407489 kubelet[1868]: E0209 19:06:56.406999 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb4c087aa", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 387344298, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 387344298, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.429685 kubelet[1868]: I0209 19:06:56.429656 1868 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:06:56.429685 kubelet[1868]: I0209 19:06:56.429679 1868 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:06:56.429908 kubelet[1868]: I0209 19:06:56.429699 1868 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:06:56.430336 kubelet[1868]: E0209 19:06:56.430207 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7390482", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428795010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428795010, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.431387 kubelet[1868]: E0209 19:06:56.431056 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7391f13", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428801811, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428801811, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.431805 kubelet[1868]: E0209 19:06:56.431732 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7393557", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428807511, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428807511, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.436007 kubelet[1868]: I0209 19:06:56.435988 1868 policy_none.go:49] "None policy: Start" Feb 9 19:06:56.436868 kubelet[1868]: I0209 19:06:56.436849 1868 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:06:56.436951 kubelet[1868]: I0209 19:06:56.436879 1868 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:06:56.436000 audit[1891]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.436000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd21372950 a2=0 a3=7ffd2137293c items=0 ppid=1868 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:06:56.437000 audit[1892]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.437000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd52e883d0 a2=0 a3=7ffd52e883bc items=0 ppid=1868 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:06:56.446109 systemd[1]: Created slice kubepods.slice. Feb 9 19:06:56.450462 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:06:56.453539 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:06:56.456000 audit[1895]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.456000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc88239870 a2=0 a3=7ffc8823985c items=0 ppid=1868 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:06:56.459311 kubelet[1868]: I0209 19:06:56.459297 1868 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:06:56.458000 audit[1868]: AVC avc: denied { mac_admin } for pid=1868 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:56.458000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:06:56.458000 audit[1868]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00098e630 a1=c000b6aaf8 a2=c00098e600 a3=25 items=0 ppid=1 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.458000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:06:56.460089 kubelet[1868]: I0209 19:06:56.460074 1868 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:06:56.460415 kubelet[1868]: I0209 19:06:56.460398 1868 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:06:56.461687 kubelet[1868]: E0209 19:06:56.461672 1868 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.43\" not found" Feb 9 19:06:56.462516 kubelet[1868]: E0209 19:06:56.462440 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb925f15a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 461099354, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 461099354, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.483000 audit[1898]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.483000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffebc727e80 a2=0 a3=7ffebc727e6c items=0 ppid=1868 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:06:56.484000 audit[1899]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.484000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe4c73cb90 a2=0 a3=7ffe4c73cb7c items=0 ppid=1868 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:06:56.486000 audit[1900]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.486000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea5118650 a2=0 a3=7ffea511863c items=0 ppid=1868 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:06:56.488000 audit[1902]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.488000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe08ce01d0 a2=0 a3=7ffe08ce01bc items=0 ppid=1868 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:06:56.495545 kubelet[1868]: I0209 19:06:56.495522 1868 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.43" Feb 9 19:06:56.497150 kubelet[1868]: E0209 19:06:56.497072 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7390482", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428795010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 495482713, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7390482" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.497399 kubelet[1868]: E0209 19:06:56.497365 1868 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.43" Feb 9 19:06:56.497994 kubelet[1868]: E0209 19:06:56.497924 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7391f13", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428801811, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 495488013, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7391f13" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.498794 kubelet[1868]: E0209 19:06:56.498739 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7393557", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428807511, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 495491813, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7393557" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.491000 audit[1904]: NETFILTER_CFG table=nat:19 family=2 entries=2 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.491000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff818caa60 a2=0 a3=7fff818caa4c items=0 ppid=1868 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:06:56.558000 audit[1907]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_rule pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.558000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd25c05050 a2=0 a3=7ffd25c0503c items=0 ppid=1868 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:06:56.560000 audit[1909]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_rule pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.560000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc0ef9e0e0 a2=0 a3=7ffc0ef9e0cc items=0 ppid=1868 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:06:56.600000 audit[1912]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_rule pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.600000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffe204231b0 a2=0 a3=7ffe2042319c items=0 ppid=1868 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:06:56.602052 kubelet[1868]: I0209 19:06:56.602023 1868 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:06:56.602000 audit[1913]: NETFILTER_CFG table=mangle:23 family=10 entries=2 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.602000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd99efc210 a2=0 a3=7ffd99efc1fc items=0 ppid=1868 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:06:56.602000 audit[1914]: NETFILTER_CFG table=mangle:24 family=2 entries=1 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.602000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2f3d7440 a2=0 a3=7fff2f3d742c items=0 ppid=1868 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:06:56.604000 audit[1915]: NETFILTER_CFG table=nat:25 family=2 entries=1 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.604000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff06ad81f0 a2=0 a3=7fff06ad81dc items=0 ppid=1868 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:06:56.604000 audit[1916]: NETFILTER_CFG table=nat:26 family=10 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.604000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcd9f6eea0 a2=0 a3=7ffcd9f6ee8c items=0 ppid=1868 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:06:56.605000 audit[1917]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:06:56.605000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd855ad90 a2=0 a3=7fffd855ad7c items=0 ppid=1868 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:06:56.607623 kubelet[1868]: E0209 19:06:56.607596 1868 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.200.8.43" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:06:56.607000 audit[1919]: NETFILTER_CFG table=nat:28 family=10 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.607000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe74d08260 a2=0 a3=7ffe74d0824c items=0 ppid=1868 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:06:56.608000 audit[1920]: NETFILTER_CFG table=filter:29 family=10 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.608000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc85cefba0 a2=0 a3=7ffc85cefb8c items=0 ppid=1868 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:06:56.611000 audit[1922]: NETFILTER_CFG table=filter:30 family=10 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.611000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffea64adcf0 a2=0 a3=7ffea64adcdc items=0 ppid=1868 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:06:56.612000 audit[1923]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.612000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd60b3f610 a2=0 a3=7ffd60b3f5fc items=0 ppid=1868 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:06:56.613000 audit[1924]: NETFILTER_CFG table=nat:32 family=10 entries=1 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.613000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf05d6130 a2=0 a3=7ffdf05d611c items=0 ppid=1868 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.613000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:06:56.614000 audit[1926]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.614000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff39aa3fa0 a2=0 a3=7fff39aa3f8c items=0 ppid=1868 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:06:56.617000 audit[1928]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.617000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff985fda70 a2=0 a3=7fff985fda5c items=0 ppid=1868 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:06:56.619000 audit[1930]: NETFILTER_CFG table=nat:35 family=10 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.619000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffdd1b62890 a2=0 a3=7ffdd1b6287c items=0 ppid=1868 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:06:56.621000 audit[1932]: NETFILTER_CFG table=nat:36 family=10 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.621000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd2e8f9e30 a2=0 a3=7ffd2e8f9e1c items=0 ppid=1868 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:06:56.635000 audit[1934]: NETFILTER_CFG table=nat:37 family=10 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.635000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffe58929a80 a2=0 a3=7ffe58929a6c items=0 ppid=1868 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:06:56.637948 kubelet[1868]: I0209 19:06:56.637928 1868 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:06:56.638066 kubelet[1868]: I0209 19:06:56.638055 1868 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:06:56.638170 kubelet[1868]: I0209 19:06:56.638160 1868 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:06:56.638286 kubelet[1868]: E0209 19:06:56.638277 1868 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:06:56.640417 kubelet[1868]: W0209 19:06:56.640398 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:06:56.640545 kubelet[1868]: E0209 19:06:56.640534 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:06:56.639000 audit[1935]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.639000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5ab69680 a2=0 a3=7fff5ab6966c items=0 ppid=1868 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:06:56.641000 audit[1936]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.641000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6469d530 a2=0 a3=7ffe6469d51c items=0 ppid=1868 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:06:56.642000 audit[1937]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:06:56.642000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd266bd850 a2=0 a3=7ffd266bd83c items=0 ppid=1868 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:56.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:06:56.698943 kubelet[1868]: I0209 19:06:56.698895 1868 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.43" Feb 9 19:06:56.700273 kubelet[1868]: E0209 19:06:56.700241 1868 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.43" Feb 9 19:06:56.700504 kubelet[1868]: E0209 19:06:56.700239 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7390482", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428795010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 698837446, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7390482" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.701647 kubelet[1868]: E0209 19:06:56.701566 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7391f13", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428801811, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 698845346, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7391f13" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:56.788457 kubelet[1868]: E0209 19:06:56.788317 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7393557", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428807511, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 698853546, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7393557" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:57.009518 kubelet[1868]: E0209 19:06:57.009472 1868 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.200.8.43" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:06:57.101847 kubelet[1868]: I0209 19:06:57.101801 1868 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.43" Feb 9 19:06:57.103162 kubelet[1868]: E0209 19:06:57.103131 1868 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.43" Feb 9 19:06:57.103339 kubelet[1868]: E0209 19:06:57.103106 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7390482", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428795010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 57, 101745068, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7390482" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:57.188231 kubelet[1868]: E0209 19:06:57.188124 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7391f13", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428801811, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 57, 101758568, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7391f13" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:57.301433 kubelet[1868]: W0209 19:06:57.301292 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:06:57.301433 kubelet[1868]: E0209 19:06:57.301340 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:06:57.385902 kubelet[1868]: E0209 19:06:57.385828 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:06:57.388268 kubelet[1868]: E0209 19:06:57.388170 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7393557", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428807511, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 57, 101763468, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7393557" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:57.731816 kubelet[1868]: W0209 19:06:57.731777 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:06:57.731816 kubelet[1868]: E0209 19:06:57.731820 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:06:57.781309 kubelet[1868]: W0209 19:06:57.781266 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:06:57.781309 kubelet[1868]: E0209 19:06:57.781305 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:06:57.811077 kubelet[1868]: E0209 19:06:57.811039 1868 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.200.8.43" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:06:57.904686 kubelet[1868]: I0209 19:06:57.904647 1868 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.43" Feb 9 19:06:57.906111 kubelet[1868]: E0209 19:06:57.906087 1868 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.43" Feb 9 19:06:57.906241 kubelet[1868]: E0209 19:06:57.906045 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7390482", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428795010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 57, 904564892, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7390482" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:57.907313 kubelet[1868]: E0209 19:06:57.907245 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7391f13", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428801811, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 57, 904577392, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7391f13" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:57.988193 kubelet[1868]: E0209 19:06:57.988007 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7393557", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428807511, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 57, 904613393, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7393557" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:58.195602 kubelet[1868]: W0209 19:06:58.195559 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:06:58.195602 kubelet[1868]: E0209 19:06:58.195605 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:06:58.386168 kubelet[1868]: E0209 19:06:58.386017 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:06:58.953921 kubelet[1868]: W0209 19:06:58.953879 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:06:58.953921 kubelet[1868]: E0209 19:06:58.953919 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:06:59.387059 kubelet[1868]: E0209 19:06:59.386991 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:06:59.412767 kubelet[1868]: E0209 19:06:59.412717 1868 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.200.8.43" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:06:59.507527 kubelet[1868]: I0209 19:06:59.507487 1868 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.43" Feb 9 19:06:59.508739 kubelet[1868]: E0209 19:06:59.508706 1868 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.43" Feb 9 19:06:59.509094 kubelet[1868]: E0209 19:06:59.509008 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7390482", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428795010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 59, 507422915, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7390482" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:59.510006 kubelet[1868]: E0209 19:06:59.509930 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7391f13", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428801811, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 59, 507442415, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7391f13" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:06:59.511237 kubelet[1868]: E0209 19:06:59.511051 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7393557", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428807511, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 6, 59, 507447715, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7393557" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:07:00.141626 kubelet[1868]: W0209 19:07:00.141584 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:07:00.141626 kubelet[1868]: E0209 19:07:00.141627 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:07:00.387359 kubelet[1868]: E0209 19:07:00.387298 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:00.834927 kubelet[1868]: W0209 19:07:00.834877 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:07:00.834927 kubelet[1868]: E0209 19:07:00.834924 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:07:00.900696 kubelet[1868]: W0209 19:07:00.900648 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:07:00.900696 kubelet[1868]: E0209 19:07:00.900695 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:07:01.388125 kubelet[1868]: E0209 19:07:01.388053 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:02.388639 kubelet[1868]: E0209 19:07:02.388570 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:02.614924 kubelet[1868]: E0209 19:07:02.614875 1868 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.200.8.43" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:07:02.710111 kubelet[1868]: I0209 19:07:02.709753 1868 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.43" Feb 9 19:07:02.710976 kubelet[1868]: E0209 19:07:02.710950 1868 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.43" Feb 9 19:07:02.711364 kubelet[1868]: E0209 19:07:02.711293 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7390482", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428795010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 7, 2, 709701560, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7390482" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:07:02.712229 kubelet[1868]: E0209 19:07:02.712163 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7391f13", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428801811, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 7, 2, 709714960, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7391f13" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:07:02.713101 kubelet[1868]: E0209 19:07:02.713043 1868 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43.17b2474fb7393557", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.43", UID:"10.200.8.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.43"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 6, 56, 428807511, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 7, 2, 709720060, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.43.17b2474fb7393557" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:07:03.389423 kubelet[1868]: E0209 19:07:03.389352 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:04.317634 kubelet[1868]: W0209 19:07:04.317586 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:07:04.317634 kubelet[1868]: E0209 19:07:04.317632 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:07:04.390269 kubelet[1868]: E0209 19:07:04.390207 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:05.321281 kubelet[1868]: W0209 19:07:05.321231 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:07:05.321281 kubelet[1868]: E0209 19:07:05.321279 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:07:05.391096 kubelet[1868]: E0209 19:07:05.391034 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:05.695021 kubelet[1868]: W0209 19:07:05.694891 1868 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:07:05.695021 kubelet[1868]: E0209 19:07:05.694932 1868 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:07:06.377664 kubelet[1868]: I0209 19:07:06.377593 1868 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 19:07:06.391918 kubelet[1868]: E0209 19:07:06.391884 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:06.462052 kubelet[1868]: E0209 19:07:06.462014 1868 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.43\" not found" Feb 9 19:07:06.758843 kubelet[1868]: E0209 19:07:06.758792 1868 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.43" not found Feb 9 19:07:07.392802 kubelet[1868]: E0209 19:07:07.392742 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:08.007389 kubelet[1868]: E0209 19:07:08.007334 1868 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.43" not found Feb 9 19:07:08.393271 kubelet[1868]: E0209 19:07:08.393119 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:09.019862 kubelet[1868]: E0209 19:07:09.019822 1868 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.43\" not found" node="10.200.8.43" Feb 9 19:07:09.112502 kubelet[1868]: I0209 19:07:09.112461 1868 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.43" Feb 9 19:07:09.393548 kubelet[1868]: E0209 19:07:09.393394 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:09.408729 kubelet[1868]: I0209 19:07:09.408695 1868 kubelet_node_status.go:73] "Successfully registered node" node="10.200.8.43" Feb 9 19:07:09.417174 kubelet[1868]: E0209 19:07:09.417146 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:09.517334 kubelet[1868]: E0209 19:07:09.517266 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:09.617735 kubelet[1868]: E0209 19:07:09.617671 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:09.642674 sudo[1650]: pam_unix(sudo:session): session closed for user root Feb 9 19:07:09.641000 audit[1650]: USER_END pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:07:09.647338 kernel: kauditd_printk_skb: 278 callbacks suppressed Feb 9 19:07:09.647435 kernel: audit: type=1106 audit(1707505629.641:580): pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:07:09.641000 audit[1650]: CRED_DISP pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:07:09.676482 kernel: audit: type=1104 audit(1707505629.641:581): pid=1650 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:07:09.718338 kubelet[1868]: E0209 19:07:09.718279 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:09.745261 sshd[1647]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:09.745000 audit[1647]: USER_END pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:09.749227 systemd[1]: sshd@6-10.200.8.43:22-10.200.12.6:33852.service: Deactivated successfully. Feb 9 19:07:09.750140 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:07:09.751573 systemd-logind[1301]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:07:09.752680 systemd-logind[1301]: Removed session 9. Feb 9 19:07:09.745000 audit[1647]: CRED_DISP pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:09.779250 kernel: audit: type=1106 audit(1707505629.745:582): pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:09.779338 kernel: audit: type=1104 audit(1707505629.745:583): pid=1647 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:09.779359 kernel: audit: type=1131 audit(1707505629.748:584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.43:22-10.200.12.6:33852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:09.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.43:22-10.200.12.6:33852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:09.818791 kubelet[1868]: E0209 19:07:09.818752 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:09.919775 kubelet[1868]: E0209 19:07:09.919626 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.020084 kubelet[1868]: E0209 19:07:10.020043 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.120835 kubelet[1868]: E0209 19:07:10.120777 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.221574 kubelet[1868]: E0209 19:07:10.221529 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.322389 kubelet[1868]: E0209 19:07:10.322329 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.394159 kubelet[1868]: E0209 19:07:10.394098 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:10.422542 kubelet[1868]: E0209 19:07:10.422480 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.523492 kubelet[1868]: E0209 19:07:10.523342 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.624161 kubelet[1868]: E0209 19:07:10.624105 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.724296 kubelet[1868]: E0209 19:07:10.724238 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.825183 kubelet[1868]: E0209 19:07:10.825034 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:10.926073 kubelet[1868]: E0209 19:07:10.926009 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.026765 kubelet[1868]: E0209 19:07:11.026710 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.127659 kubelet[1868]: E0209 19:07:11.127518 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.228711 kubelet[1868]: E0209 19:07:11.228653 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.329503 kubelet[1868]: E0209 19:07:11.329439 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.394396 kubelet[1868]: E0209 19:07:11.394235 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:11.429776 kubelet[1868]: E0209 19:07:11.429707 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.530261 kubelet[1868]: E0209 19:07:11.530209 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.631103 kubelet[1868]: E0209 19:07:11.631047 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.732181 kubelet[1868]: E0209 19:07:11.732134 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.833009 kubelet[1868]: E0209 19:07:11.832952 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:11.934138 kubelet[1868]: E0209 19:07:11.934081 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.034970 kubelet[1868]: E0209 19:07:12.034839 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.135784 kubelet[1868]: E0209 19:07:12.135686 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.236499 kubelet[1868]: E0209 19:07:12.236434 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.337448 kubelet[1868]: E0209 19:07:12.337189 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.394936 kubelet[1868]: E0209 19:07:12.394866 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:12.438385 kubelet[1868]: E0209 19:07:12.438327 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.539231 kubelet[1868]: E0209 19:07:12.539178 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.639969 kubelet[1868]: E0209 19:07:12.639829 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.740886 kubelet[1868]: E0209 19:07:12.740824 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.841612 kubelet[1868]: E0209 19:07:12.841556 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:12.942717 kubelet[1868]: E0209 19:07:12.942575 1868 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.43\" not found" Feb 9 19:07:13.044386 kubelet[1868]: I0209 19:07:13.044340 1868 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 19:07:13.044797 env[1311]: time="2024-02-09T19:07:13.044751285Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:07:13.045267 kubelet[1868]: I0209 19:07:13.045044 1868 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 19:07:13.395245 kubelet[1868]: I0209 19:07:13.395172 1868 apiserver.go:52] "Watching apiserver" Feb 9 19:07:13.395868 kubelet[1868]: E0209 19:07:13.395202 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:13.398116 kubelet[1868]: I0209 19:07:13.398086 1868 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:07:13.398275 kubelet[1868]: I0209 19:07:13.398189 1868 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:07:13.398452 kubelet[1868]: I0209 19:07:13.398289 1868 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:07:13.399670 kubelet[1868]: E0209 19:07:13.398560 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:13.405824 systemd[1]: Created slice kubepods-besteffort-podd3f9a5f4_512d_45e8_93f2_70575f86f5eb.slice. Feb 9 19:07:13.420114 systemd[1]: Created slice kubepods-besteffort-pod641a3d8b_4007_487c_af24_5f6d86003d0a.slice. Feb 9 19:07:13.498380 kubelet[1868]: I0209 19:07:13.498315 1868 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:07:13.502032 kubelet[1868]: I0209 19:07:13.501999 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-cni-net-dir\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502165 kubelet[1868]: I0209 19:07:13.502055 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-flexvol-driver-host\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502165 kubelet[1868]: I0209 19:07:13.502091 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7kmx9\" (UniqueName: \"kubernetes.io/projected/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-kube-api-access-7kmx9\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502165 kubelet[1868]: I0209 19:07:13.502125 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ppckw\" (UniqueName: \"kubernetes.io/projected/ae224fc7-f214-4a1f-b1d8-f57095e2412a-kube-api-access-ppckw\") pod \"csi-node-driver-pqcjc\" (UID: \"ae224fc7-f214-4a1f-b1d8-f57095e2412a\") " pod="calico-system/csi-node-driver-pqcjc" Feb 9 19:07:13.502165 kubelet[1868]: I0209 19:07:13.502159 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-policysync\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502413 kubelet[1868]: I0209 19:07:13.502193 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-node-certs\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502413 kubelet[1868]: I0209 19:07:13.502234 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ae224fc7-f214-4a1f-b1d8-f57095e2412a-kubelet-dir\") pod \"csi-node-driver-pqcjc\" (UID: \"ae224fc7-f214-4a1f-b1d8-f57095e2412a\") " pod="calico-system/csi-node-driver-pqcjc" Feb 9 19:07:13.502413 kubelet[1868]: I0209 19:07:13.502271 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ae224fc7-f214-4a1f-b1d8-f57095e2412a-socket-dir\") pod \"csi-node-driver-pqcjc\" (UID: \"ae224fc7-f214-4a1f-b1d8-f57095e2412a\") " pod="calico-system/csi-node-driver-pqcjc" Feb 9 19:07:13.502413 kubelet[1868]: I0209 19:07:13.502310 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ae224fc7-f214-4a1f-b1d8-f57095e2412a-registration-dir\") pod \"csi-node-driver-pqcjc\" (UID: \"ae224fc7-f214-4a1f-b1d8-f57095e2412a\") " pod="calico-system/csi-node-driver-pqcjc" Feb 9 19:07:13.502413 kubelet[1868]: I0209 19:07:13.502365 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-lib-modules\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502695 kubelet[1868]: I0209 19:07:13.502423 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-tigera-ca-bundle\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502695 kubelet[1868]: I0209 19:07:13.502460 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-var-run-calico\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502695 kubelet[1868]: I0209 19:07:13.502510 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-cni-log-dir\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502695 kubelet[1868]: I0209 19:07:13.502550 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/641a3d8b-4007-487c-af24-5f6d86003d0a-lib-modules\") pod \"kube-proxy-d6lzr\" (UID: \"641a3d8b-4007-487c-af24-5f6d86003d0a\") " pod="kube-system/kube-proxy-d6lzr" Feb 9 19:07:13.502695 kubelet[1868]: I0209 19:07:13.502614 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-xtables-lock\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502958 kubelet[1868]: I0209 19:07:13.502653 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x758p\" (UniqueName: \"kubernetes.io/projected/641a3d8b-4007-487c-af24-5f6d86003d0a-kube-api-access-x758p\") pod \"kube-proxy-d6lzr\" (UID: \"641a3d8b-4007-487c-af24-5f6d86003d0a\") " pod="kube-system/kube-proxy-d6lzr" Feb 9 19:07:13.502958 kubelet[1868]: I0209 19:07:13.502691 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-var-lib-calico\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502958 kubelet[1868]: I0209 19:07:13.502746 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d3f9a5f4-512d-45e8-93f2-70575f86f5eb-cni-bin-dir\") pod \"calico-node-zgrxs\" (UID: \"d3f9a5f4-512d-45e8-93f2-70575f86f5eb\") " pod="calico-system/calico-node-zgrxs" Feb 9 19:07:13.502958 kubelet[1868]: I0209 19:07:13.502784 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ae224fc7-f214-4a1f-b1d8-f57095e2412a-varrun\") pod \"csi-node-driver-pqcjc\" (UID: \"ae224fc7-f214-4a1f-b1d8-f57095e2412a\") " pod="calico-system/csi-node-driver-pqcjc" Feb 9 19:07:13.502958 kubelet[1868]: I0209 19:07:13.502821 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/641a3d8b-4007-487c-af24-5f6d86003d0a-kube-proxy\") pod \"kube-proxy-d6lzr\" (UID: \"641a3d8b-4007-487c-af24-5f6d86003d0a\") " pod="kube-system/kube-proxy-d6lzr" Feb 9 19:07:13.503230 kubelet[1868]: I0209 19:07:13.502858 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/641a3d8b-4007-487c-af24-5f6d86003d0a-xtables-lock\") pod \"kube-proxy-d6lzr\" (UID: \"641a3d8b-4007-487c-af24-5f6d86003d0a\") " pod="kube-system/kube-proxy-d6lzr" Feb 9 19:07:13.503230 kubelet[1868]: I0209 19:07:13.502873 1868 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:07:13.606843 kubelet[1868]: E0209 19:07:13.606804 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.607112 kubelet[1868]: W0209 19:07:13.607088 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.607249 kubelet[1868]: E0209 19:07:13.607233 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.607649 kubelet[1868]: E0209 19:07:13.607626 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.607796 kubelet[1868]: W0209 19:07:13.607777 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.607902 kubelet[1868]: E0209 19:07:13.607890 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.608222 kubelet[1868]: E0209 19:07:13.608205 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.608333 kubelet[1868]: W0209 19:07:13.608318 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.608465 kubelet[1868]: E0209 19:07:13.608452 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.608911 kubelet[1868]: E0209 19:07:13.608892 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.609014 kubelet[1868]: W0209 19:07:13.609001 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.609087 kubelet[1868]: E0209 19:07:13.609077 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.613735 kubelet[1868]: E0209 19:07:13.610993 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.613735 kubelet[1868]: W0209 19:07:13.611011 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.613735 kubelet[1868]: E0209 19:07:13.611035 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.707269 kubelet[1868]: E0209 19:07:13.705078 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.707269 kubelet[1868]: W0209 19:07:13.705106 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.707269 kubelet[1868]: E0209 19:07:13.705138 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.707269 kubelet[1868]: E0209 19:07:13.705357 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.707269 kubelet[1868]: W0209 19:07:13.705386 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.707269 kubelet[1868]: E0209 19:07:13.705403 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.707269 kubelet[1868]: E0209 19:07:13.705617 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.707269 kubelet[1868]: W0209 19:07:13.705628 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.707269 kubelet[1868]: E0209 19:07:13.705648 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.806831 kubelet[1868]: E0209 19:07:13.806782 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.806831 kubelet[1868]: W0209 19:07:13.806811 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.806831 kubelet[1868]: E0209 19:07:13.806840 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.807234 kubelet[1868]: E0209 19:07:13.807119 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.807234 kubelet[1868]: W0209 19:07:13.807132 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.807234 kubelet[1868]: E0209 19:07:13.807152 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.807466 kubelet[1868]: E0209 19:07:13.807363 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.807466 kubelet[1868]: W0209 19:07:13.807396 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.807466 kubelet[1868]: E0209 19:07:13.807416 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.908422 kubelet[1868]: E0209 19:07:13.908394 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.908647 kubelet[1868]: W0209 19:07:13.908610 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.908716 kubelet[1868]: E0209 19:07:13.908650 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.908940 kubelet[1868]: E0209 19:07:13.908921 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.909031 kubelet[1868]: W0209 19:07:13.908945 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.909031 kubelet[1868]: E0209 19:07:13.908970 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.909233 kubelet[1868]: E0209 19:07:13.909212 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.909318 kubelet[1868]: W0209 19:07:13.909234 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.909407 kubelet[1868]: E0209 19:07:13.909321 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:13.909543 kubelet[1868]: E0209 19:07:13.909528 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:13.909608 kubelet[1868]: W0209 19:07:13.909540 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:13.909608 kubelet[1868]: E0209 19:07:13.909565 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:14.010796 kubelet[1868]: E0209 19:07:14.010756 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:14.010796 kubelet[1868]: W0209 19:07:14.010781 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:14.010796 kubelet[1868]: E0209 19:07:14.010814 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:14.011181 kubelet[1868]: E0209 19:07:14.011134 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:14.011181 kubelet[1868]: W0209 19:07:14.011166 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:14.011285 kubelet[1868]: E0209 19:07:14.011194 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:14.023597 env[1311]: time="2024-02-09T19:07:14.023542194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d6lzr,Uid:641a3d8b-4007-487c-af24-5f6d86003d0a,Namespace:kube-system,Attempt:0,}" Feb 9 19:07:14.104711 kubelet[1868]: E0209 19:07:14.104678 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:14.104935 kubelet[1868]: W0209 19:07:14.104918 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:14.105040 kubelet[1868]: E0209 19:07:14.105029 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:14.112006 kubelet[1868]: E0209 19:07:14.111978 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:14.112006 kubelet[1868]: W0209 19:07:14.111996 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:14.112186 kubelet[1868]: E0209 19:07:14.112022 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:14.213283 kubelet[1868]: E0209 19:07:14.213236 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:14.213283 kubelet[1868]: W0209 19:07:14.213271 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:14.213537 kubelet[1868]: E0209 19:07:14.213314 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:14.308096 kubelet[1868]: E0209 19:07:14.307979 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:14.308096 kubelet[1868]: W0209 19:07:14.307999 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:14.308096 kubelet[1868]: E0209 19:07:14.308023 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:14.319824 env[1311]: time="2024-02-09T19:07:14.319769675Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zgrxs,Uid:d3f9a5f4-512d-45e8-93f2-70575f86f5eb,Namespace:calico-system,Attempt:0,}" Feb 9 19:07:14.396438 kubelet[1868]: E0209 19:07:14.396325 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:14.901880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount16408326.mount: Deactivated successfully. Feb 9 19:07:14.936866 env[1311]: time="2024-02-09T19:07:14.936788566Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:14.945872 env[1311]: time="2024-02-09T19:07:14.945824115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:14.950048 env[1311]: time="2024-02-09T19:07:14.950007537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:14.957584 env[1311]: time="2024-02-09T19:07:14.957547377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:14.962034 env[1311]: time="2024-02-09T19:07:14.961996601Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:14.966821 env[1311]: time="2024-02-09T19:07:14.966782426Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:14.978700 env[1311]: time="2024-02-09T19:07:14.978665490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:14.979240 env[1311]: time="2024-02-09T19:07:14.979209893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:15.053314 env[1311]: time="2024-02-09T19:07:15.053226783Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:07:15.053588 env[1311]: time="2024-02-09T19:07:15.053553785Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:07:15.053719 env[1311]: time="2024-02-09T19:07:15.053695785Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:07:15.054041 env[1311]: time="2024-02-09T19:07:15.053977587Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d08f942f0950ea32714c6ecdf57887e92d86bfdf3a18ce07f17181d699d795e2 pid=1973 runtime=io.containerd.runc.v2 Feb 9 19:07:15.063512 env[1311]: time="2024-02-09T19:07:15.063320136Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:07:15.063512 env[1311]: time="2024-02-09T19:07:15.063357336Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:07:15.063512 env[1311]: time="2024-02-09T19:07:15.063379936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:07:15.063737 env[1311]: time="2024-02-09T19:07:15.063544937Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a pid=1992 runtime=io.containerd.runc.v2 Feb 9 19:07:15.082218 systemd[1]: Started cri-containerd-d08f942f0950ea32714c6ecdf57887e92d86bfdf3a18ce07f17181d699d795e2.scope. Feb 9 19:07:15.099007 systemd[1]: Started cri-containerd-052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a.scope. Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119574 kernel: audit: type=1400 audit(1707505635.104:585): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.152526 kernel: audit: type=1400 audit(1707505635.104:586): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.152675 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:07:15.152708 kernel: audit: type=1400 audit(1707505635.104:587): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.152741 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:07:15.152761 kernel: audit: backlog limit exceeded Feb 9 19:07:15.152789 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:07:15.152810 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:07:15.152832 kernel: audit: backlog limit exceeded Feb 9 19:07:15.152851 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.118000 audit: BPF prog-id=68 op=LOAD Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1973 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:15.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386639343266303935306561333237313463366563646635373838 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1973 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:15.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386639343266303935306561333237313463366563646635373838 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit: BPF prog-id=69 op=LOAD Feb 9 19:07:15.119000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000333ad0 items=0 ppid=1973 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:15.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386639343266303935306561333237313463366563646635373838 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit: BPF prog-id=70 op=LOAD Feb 9 19:07:15.119000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000333b18 items=0 ppid=1973 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:15.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386639343266303935306561333237313463366563646635373838 Feb 9 19:07:15.119000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:07:15.119000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.119000 audit: BPF prog-id=71 op=LOAD Feb 9 19:07:15.119000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000333f28 items=0 ppid=1973 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:15.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386639343266303935306561333237313463366563646635373838 Feb 9 19:07:15.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.173000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.173000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00018c3c8 items=0 ppid=1992 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:15.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035326631343131303939613734343033333534306261666432353630 Feb 9 19:07:15.181000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:07:15.181000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:15.181000 audit: BPF prog-id=75 op=LOAD Feb 9 19:07:15.181000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00018c7d8 items=0 ppid=1992 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:15.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035326631343131303939613734343033333534306261666432353630 Feb 9 19:07:15.197901 env[1311]: time="2024-02-09T19:07:15.197855442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d6lzr,Uid:641a3d8b-4007-487c-af24-5f6d86003d0a,Namespace:kube-system,Attempt:0,} returns sandbox id \"d08f942f0950ea32714c6ecdf57887e92d86bfdf3a18ce07f17181d699d795e2\"" Feb 9 19:07:15.200827 env[1311]: time="2024-02-09T19:07:15.200697257Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:07:15.203262 env[1311]: time="2024-02-09T19:07:15.203230070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zgrxs,Uid:d3f9a5f4-512d-45e8-93f2-70575f86f5eb,Namespace:calico-system,Attempt:0,} returns sandbox id \"052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a\"" Feb 9 19:07:15.396516 kubelet[1868]: E0209 19:07:15.396462 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:15.639199 kubelet[1868]: E0209 19:07:15.639138 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:16.259242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1233394322.mount: Deactivated successfully. Feb 9 19:07:16.385511 kubelet[1868]: E0209 19:07:16.385437 1868 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:16.396691 kubelet[1868]: E0209 19:07:16.396619 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:16.758819 env[1311]: time="2024-02-09T19:07:16.758764464Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:16.763546 env[1311]: time="2024-02-09T19:07:16.763503088Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:16.766623 env[1311]: time="2024-02-09T19:07:16.766583304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:16.770654 env[1311]: time="2024-02-09T19:07:16.770618325Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:16.771064 env[1311]: time="2024-02-09T19:07:16.771030327Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 19:07:16.772469 env[1311]: time="2024-02-09T19:07:16.772441634Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:07:16.773412 env[1311]: time="2024-02-09T19:07:16.773365139Z" level=info msg="CreateContainer within sandbox \"d08f942f0950ea32714c6ecdf57887e92d86bfdf3a18ce07f17181d699d795e2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:07:16.814909 env[1311]: time="2024-02-09T19:07:16.814849853Z" level=info msg="CreateContainer within sandbox \"d08f942f0950ea32714c6ecdf57887e92d86bfdf3a18ce07f17181d699d795e2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7a3ab8c39f252b99bc1a426244825a7f500cb6cfb3b7d9cd70d17e6d0266c26b\"" Feb 9 19:07:16.815620 env[1311]: time="2024-02-09T19:07:16.815586657Z" level=info msg="StartContainer for \"7a3ab8c39f252b99bc1a426244825a7f500cb6cfb3b7d9cd70d17e6d0266c26b\"" Feb 9 19:07:16.835841 systemd[1]: Started cri-containerd-7a3ab8c39f252b99bc1a426244825a7f500cb6cfb3b7d9cd70d17e6d0266c26b.scope. Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1973 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761336162386333396632353262393962633161343236323434383235 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.852000 audit: BPF prog-id=76 op=LOAD Feb 9 19:07:16.852000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003cc1f0 items=0 ppid=1973 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761336162386333396632353262393962633161343236323434383235 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit: BPF prog-id=77 op=LOAD Feb 9 19:07:16.853000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003cc238 items=0 ppid=1973 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761336162386333396632353262393962633161343236323434383235 Feb 9 19:07:16.853000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:07:16.853000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:16.853000 audit: BPF prog-id=78 op=LOAD Feb 9 19:07:16.853000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003cc2c8 items=0 ppid=1973 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761336162386333396632353262393962633161343236323434383235 Feb 9 19:07:16.876934 env[1311]: time="2024-02-09T19:07:16.876877173Z" level=info msg="StartContainer for \"7a3ab8c39f252b99bc1a426244825a7f500cb6cfb3b7d9cd70d17e6d0266c26b\" returns successfully" Feb 9 19:07:16.918000 audit[2104]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:16.918000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc80f0d6f0 a2=0 a3=7ffc80f0d6dc items=0 ppid=2065 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:07:16.920000 audit[2105]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2105 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:16.920000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0f80d980 a2=0 a3=7fff0f80d96c items=0 ppid=2065 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:07:16.921000 audit[2106]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:16.921000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcff9ddd0 a2=0 a3=7fffcff9ddbc items=0 ppid=2065 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.921000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:07:16.923000 audit[2107]: NETFILTER_CFG table=nat:44 family=10 entries=1 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:16.923000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe22be4d90 a2=0 a3=7ffe22be4d7c items=0 ppid=2065 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:07:16.924000 audit[2108]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:16.924000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0bb70770 a2=0 a3=7ffe0bb7075c items=0 ppid=2065 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:07:16.924000 audit[2109]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:16.924000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3ea3cf30 a2=0 a3=7ffc3ea3cf1c items=0 ppid=2065 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:16.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:07:17.019000 audit[2110]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.019000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe8db765c0 a2=0 a3=7ffe8db765ac items=0 ppid=2065 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:07:17.024000 audit[2112]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.024000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff3d585bb0 a2=0 a3=7fff3d585b9c items=0 ppid=2065 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:07:17.028000 audit[2115]: NETFILTER_CFG table=filter:49 family=2 entries=2 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.028000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca74811b0 a2=0 a3=7ffca748119c items=0 ppid=2065 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:07:17.030000 audit[2116]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.030000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd84742e20 a2=0 a3=7ffd84742e0c items=0 ppid=2065 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:07:17.033000 audit[2118]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.033000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4966c9d0 a2=0 a3=7fff4966c9bc items=0 ppid=2065 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:07:17.034000 audit[2119]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.034000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8a805160 a2=0 a3=7ffd8a80514c items=0 ppid=2065 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:07:17.036000 audit[2121]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.036000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe4df66960 a2=0 a3=7ffe4df6694c items=0 ppid=2065 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:07:17.040000 audit[2124]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.040000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe1e7aa380 a2=0 a3=7ffe1e7aa36c items=0 ppid=2065 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:07:17.041000 audit[2125]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.041000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff732f980 a2=0 a3=7ffff732f96c items=0 ppid=2065 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:07:17.043000 audit[2127]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.043000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff487e4780 a2=0 a3=7fff487e476c items=0 ppid=2065 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:07:17.044000 audit[2128]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.044000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef43ddf80 a2=0 a3=7ffef43ddf6c items=0 ppid=2065 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:07:17.047000 audit[2130]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.047000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3b2342c0 a2=0 a3=7fff3b2342ac items=0 ppid=2065 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:07:17.050000 audit[2133]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.050000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe846309e0 a2=0 a3=7ffe846309cc items=0 ppid=2065 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:07:17.054000 audit[2136]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.054000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6dd5faf0 a2=0 a3=7ffe6dd5fadc items=0 ppid=2065 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:07:17.055000 audit[2137]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.055000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe380f39f0 a2=0 a3=7ffe380f39dc items=0 ppid=2065 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:07:17.057000 audit[2139]: NETFILTER_CFG table=nat:62 family=2 entries=2 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.057000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffffbb66760 a2=0 a3=7ffffbb6674c items=0 ppid=2065 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:07:17.060000 audit[2142]: NETFILTER_CFG table=nat:63 family=2 entries=2 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:07:17.060000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd1222f530 a2=0 a3=7ffd1222f51c items=0 ppid=2065 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:07:17.066000 audit[2146]: NETFILTER_CFG table=filter:64 family=2 entries=3 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:07:17.066000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff07a2cc50 a2=0 a3=7fff07a2cc3c items=0 ppid=2065 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:07:17.117000 audit[2146]: NETFILTER_CFG table=nat:65 family=2 entries=68 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:07:17.117000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7fff07a2cc50 a2=0 a3=7fff07a2cc3c items=0 ppid=2065 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:07:17.159000 audit[2153]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.159000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe187c39f0 a2=0 a3=7ffe187c39dc items=0 ppid=2065 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:07:17.162000 audit[2155]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.162000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff5c34bce0 a2=0 a3=7fff5c34bccc items=0 ppid=2065 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:07:17.165000 audit[2158]: NETFILTER_CFG table=filter:68 family=10 entries=2 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.165000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcdc82fc0 a2=0 a3=7fffcdc82fac items=0 ppid=2065 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:07:17.167000 audit[2159]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.167000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed51f8030 a2=0 a3=7ffed51f801c items=0 ppid=2065 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:07:17.171000 audit[2161]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_rule pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.171000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1171ae70 a2=0 a3=7fff1171ae5c items=0 ppid=2065 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:07:17.173000 audit[2162]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.173000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffba173750 a2=0 a3=7fffba17373c items=0 ppid=2065 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:07:17.175000 audit[2164]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.175000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcdd7b46c0 a2=0 a3=7ffcdd7b46ac items=0 ppid=2065 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:07:17.179000 audit[2167]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.179000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffce9bf69f0 a2=0 a3=7ffce9bf69dc items=0 ppid=2065 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:07:17.180000 audit[2168]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.180000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbaede8f0 a2=0 a3=7fffbaede8dc items=0 ppid=2065 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:07:17.182000 audit[2170]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.182000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce5404bb0 a2=0 a3=7ffce5404b9c items=0 ppid=2065 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:07:17.183000 audit[2171]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.183000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff280d6970 a2=0 a3=7fff280d695c items=0 ppid=2065 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:07:17.186000 audit[2173]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.186000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc7e09710 a2=0 a3=7fffc7e096fc items=0 ppid=2065 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:07:17.189000 audit[2176]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.189000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9b5e8f10 a2=0 a3=7fff9b5e8efc items=0 ppid=2065 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:07:17.192000 audit[2179]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.192000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0277ab10 a2=0 a3=7ffd0277aafc items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:07:17.194000 audit[2180]: NETFILTER_CFG table=nat:80 family=10 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.194000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd1c4e22e0 a2=0 a3=7ffd1c4e22cc items=0 ppid=2065 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:07:17.196000 audit[2182]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.196000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffca2f30970 a2=0 a3=7ffca2f3095c items=0 ppid=2065 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:07:17.199000 audit[2185]: NETFILTER_CFG table=nat:82 family=10 entries=2 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:07:17.199000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe59de2c00 a2=0 a3=7ffe59de2bec items=0 ppid=2065 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:07:17.204000 audit[2189]: NETFILTER_CFG table=filter:83 family=10 entries=3 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:07:17.204000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffec68e7bc0 a2=0 a3=7ffec68e7bac items=0 ppid=2065 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.204000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:07:17.205000 audit[2189]: NETFILTER_CFG table=nat:84 family=10 entries=10 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:07:17.205000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffec68e7bc0 a2=0 a3=7ffec68e7bac items=0 ppid=2065 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:17.205000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:07:17.397317 kubelet[1868]: E0209 19:07:17.397191 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:17.638834 kubelet[1868]: E0209 19:07:17.638748 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:17.737707 kubelet[1868]: E0209 19:07:17.737662 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.737707 kubelet[1868]: W0209 19:07:17.737695 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.738004 kubelet[1868]: E0209 19:07:17.737725 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.738004 kubelet[1868]: E0209 19:07:17.737956 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.738004 kubelet[1868]: W0209 19:07:17.737969 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.738004 kubelet[1868]: E0209 19:07:17.737991 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.738277 kubelet[1868]: E0209 19:07:17.738190 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.738277 kubelet[1868]: W0209 19:07:17.738202 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.738277 kubelet[1868]: E0209 19:07:17.738220 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.738517 kubelet[1868]: E0209 19:07:17.738502 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.738517 kubelet[1868]: W0209 19:07:17.738515 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.738643 kubelet[1868]: E0209 19:07:17.738534 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.738747 kubelet[1868]: E0209 19:07:17.738723 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.738747 kubelet[1868]: W0209 19:07:17.738743 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.738905 kubelet[1868]: E0209 19:07:17.738763 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.738968 kubelet[1868]: E0209 19:07:17.738958 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.739020 kubelet[1868]: W0209 19:07:17.738970 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.739020 kubelet[1868]: E0209 19:07:17.738989 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.739268 kubelet[1868]: E0209 19:07:17.739232 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.739268 kubelet[1868]: W0209 19:07:17.739260 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.739461 kubelet[1868]: E0209 19:07:17.739282 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.739541 kubelet[1868]: E0209 19:07:17.739522 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.739541 kubelet[1868]: W0209 19:07:17.739534 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.739666 kubelet[1868]: E0209 19:07:17.739554 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.739757 kubelet[1868]: E0209 19:07:17.739745 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.739835 kubelet[1868]: W0209 19:07:17.739757 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.739835 kubelet[1868]: E0209 19:07:17.739777 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.740117 kubelet[1868]: E0209 19:07:17.740096 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.740117 kubelet[1868]: W0209 19:07:17.740111 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.740291 kubelet[1868]: E0209 19:07:17.740131 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.740365 kubelet[1868]: E0209 19:07:17.740345 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.740470 kubelet[1868]: W0209 19:07:17.740366 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.740470 kubelet[1868]: E0209 19:07:17.740406 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.740661 kubelet[1868]: E0209 19:07:17.740614 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.740661 kubelet[1868]: W0209 19:07:17.740626 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.740661 kubelet[1868]: E0209 19:07:17.740643 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.740840 kubelet[1868]: E0209 19:07:17.740834 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.740903 kubelet[1868]: W0209 19:07:17.740845 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.740903 kubelet[1868]: E0209 19:07:17.740861 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.741082 kubelet[1868]: E0209 19:07:17.741058 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.741082 kubelet[1868]: W0209 19:07:17.741075 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.741235 kubelet[1868]: E0209 19:07:17.741093 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.741316 kubelet[1868]: E0209 19:07:17.741296 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.741316 kubelet[1868]: W0209 19:07:17.741313 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.741488 kubelet[1868]: E0209 19:07:17.741331 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.741594 kubelet[1868]: E0209 19:07:17.741571 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.741594 kubelet[1868]: W0209 19:07:17.741588 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.741693 kubelet[1868]: E0209 19:07:17.741608 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.838614 kubelet[1868]: E0209 19:07:17.838574 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.838614 kubelet[1868]: W0209 19:07:17.838604 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.838931 kubelet[1868]: E0209 19:07:17.838636 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.839025 kubelet[1868]: E0209 19:07:17.839001 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.839089 kubelet[1868]: W0209 19:07:17.839026 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.839089 kubelet[1868]: E0209 19:07:17.839053 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.839365 kubelet[1868]: E0209 19:07:17.839344 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.839365 kubelet[1868]: W0209 19:07:17.839360 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.839571 kubelet[1868]: E0209 19:07:17.839419 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.839710 kubelet[1868]: E0209 19:07:17.839692 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.839710 kubelet[1868]: W0209 19:07:17.839707 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.839860 kubelet[1868]: E0209 19:07:17.839732 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.839986 kubelet[1868]: E0209 19:07:17.839969 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.839986 kubelet[1868]: W0209 19:07:17.839983 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.840134 kubelet[1868]: E0209 19:07:17.840082 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.840258 kubelet[1868]: E0209 19:07:17.840238 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.840258 kubelet[1868]: W0209 19:07:17.840253 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.840428 kubelet[1868]: E0209 19:07:17.840276 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.840534 kubelet[1868]: E0209 19:07:17.840512 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.840534 kubelet[1868]: W0209 19:07:17.840529 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.840670 kubelet[1868]: E0209 19:07:17.840554 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.840868 kubelet[1868]: E0209 19:07:17.840847 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.840868 kubelet[1868]: W0209 19:07:17.840863 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.841042 kubelet[1868]: E0209 19:07:17.840890 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.841194 kubelet[1868]: E0209 19:07:17.841177 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.841194 kubelet[1868]: W0209 19:07:17.841191 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.841333 kubelet[1868]: E0209 19:07:17.841220 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.841778 kubelet[1868]: E0209 19:07:17.841758 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.841778 kubelet[1868]: W0209 19:07:17.841773 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.841974 kubelet[1868]: E0209 19:07:17.841957 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.842082 kubelet[1868]: E0209 19:07:17.842054 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.842151 kubelet[1868]: W0209 19:07:17.842084 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.842151 kubelet[1868]: E0209 19:07:17.842104 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:17.842576 kubelet[1868]: E0209 19:07:17.842556 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:17.842576 kubelet[1868]: W0209 19:07:17.842570 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:17.842698 kubelet[1868]: E0209 19:07:17.842600 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.397832 kubelet[1868]: E0209 19:07:18.397780 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:18.680871 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount892936081.mount: Deactivated successfully. Feb 9 19:07:18.748528 kubelet[1868]: E0209 19:07:18.748487 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.748528 kubelet[1868]: W0209 19:07:18.748521 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.748803 kubelet[1868]: E0209 19:07:18.748549 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.748891 kubelet[1868]: E0209 19:07:18.748815 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.748891 kubelet[1868]: W0209 19:07:18.748829 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.748891 kubelet[1868]: E0209 19:07:18.748848 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.749080 kubelet[1868]: E0209 19:07:18.749071 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.749137 kubelet[1868]: W0209 19:07:18.749092 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.749137 kubelet[1868]: E0209 19:07:18.749112 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.749445 kubelet[1868]: E0209 19:07:18.749424 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.749445 kubelet[1868]: W0209 19:07:18.749445 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.749636 kubelet[1868]: E0209 19:07:18.749464 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.749702 kubelet[1868]: E0209 19:07:18.749691 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.749764 kubelet[1868]: W0209 19:07:18.749714 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.749764 kubelet[1868]: E0209 19:07:18.749736 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.749976 kubelet[1868]: E0209 19:07:18.749959 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.750053 kubelet[1868]: W0209 19:07:18.749977 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.750053 kubelet[1868]: E0209 19:07:18.750005 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.750306 kubelet[1868]: E0209 19:07:18.750287 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.750306 kubelet[1868]: W0209 19:07:18.750306 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.750479 kubelet[1868]: E0209 19:07:18.750326 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.750594 kubelet[1868]: E0209 19:07:18.750568 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.750682 kubelet[1868]: W0209 19:07:18.750594 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.750682 kubelet[1868]: E0209 19:07:18.750614 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.750873 kubelet[1868]: E0209 19:07:18.750848 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.750936 kubelet[1868]: W0209 19:07:18.750874 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.750936 kubelet[1868]: E0209 19:07:18.750893 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.751222 kubelet[1868]: E0209 19:07:18.751195 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.751222 kubelet[1868]: W0209 19:07:18.751221 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.751434 kubelet[1868]: E0209 19:07:18.751245 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.751490 kubelet[1868]: E0209 19:07:18.751480 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.751533 kubelet[1868]: W0209 19:07:18.751490 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.751533 kubelet[1868]: E0209 19:07:18.751505 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.751699 kubelet[1868]: E0209 19:07:18.751685 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.751699 kubelet[1868]: W0209 19:07:18.751699 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.751803 kubelet[1868]: E0209 19:07:18.751714 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.751930 kubelet[1868]: E0209 19:07:18.751916 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.751930 kubelet[1868]: W0209 19:07:18.751930 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.752031 kubelet[1868]: E0209 19:07:18.751946 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.752147 kubelet[1868]: E0209 19:07:18.752133 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.752209 kubelet[1868]: W0209 19:07:18.752147 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.752209 kubelet[1868]: E0209 19:07:18.752162 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.752364 kubelet[1868]: E0209 19:07:18.752350 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.752426 kubelet[1868]: W0209 19:07:18.752364 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.752426 kubelet[1868]: E0209 19:07:18.752410 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.752607 kubelet[1868]: E0209 19:07:18.752593 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.752667 kubelet[1868]: W0209 19:07:18.752607 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.752667 kubelet[1868]: E0209 19:07:18.752621 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.845392 kubelet[1868]: E0209 19:07:18.845347 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.845392 kubelet[1868]: W0209 19:07:18.845394 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.845657 kubelet[1868]: E0209 19:07:18.845430 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.845727 kubelet[1868]: E0209 19:07:18.845700 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.845727 kubelet[1868]: W0209 19:07:18.845718 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.845834 kubelet[1868]: E0209 19:07:18.845738 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.846009 kubelet[1868]: E0209 19:07:18.845989 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.846009 kubelet[1868]: W0209 19:07:18.846003 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.846160 kubelet[1868]: E0209 19:07:18.846026 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.846285 kubelet[1868]: E0209 19:07:18.846267 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.846285 kubelet[1868]: W0209 19:07:18.846282 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.846462 kubelet[1868]: E0209 19:07:18.846307 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.846513 kubelet[1868]: E0209 19:07:18.846502 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.846560 kubelet[1868]: W0209 19:07:18.846514 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.846560 kubelet[1868]: E0209 19:07:18.846529 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.846763 kubelet[1868]: E0209 19:07:18.846740 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.846763 kubelet[1868]: W0209 19:07:18.846755 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.846948 kubelet[1868]: E0209 19:07:18.846772 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.847188 kubelet[1868]: E0209 19:07:18.847171 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.847188 kubelet[1868]: W0209 19:07:18.847184 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.847295 kubelet[1868]: E0209 19:07:18.847269 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.847445 kubelet[1868]: E0209 19:07:18.847429 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.847445 kubelet[1868]: W0209 19:07:18.847441 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.847578 kubelet[1868]: E0209 19:07:18.847457 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.847658 kubelet[1868]: E0209 19:07:18.847641 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.847658 kubelet[1868]: W0209 19:07:18.847656 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.847763 kubelet[1868]: E0209 19:07:18.847671 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.847847 kubelet[1868]: E0209 19:07:18.847830 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.847847 kubelet[1868]: W0209 19:07:18.847845 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.847948 kubelet[1868]: E0209 19:07:18.847860 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.848293 kubelet[1868]: E0209 19:07:18.848060 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.848293 kubelet[1868]: W0209 19:07:18.848073 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.848293 kubelet[1868]: E0209 19:07:18.848089 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:18.848513 kubelet[1868]: E0209 19:07:18.848497 1868 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:07:18.848513 kubelet[1868]: W0209 19:07:18.848510 1868 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:07:18.848598 kubelet[1868]: E0209 19:07:18.848527 1868 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:07:19.398351 kubelet[1868]: E0209 19:07:19.398319 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:19.638874 kubelet[1868]: E0209 19:07:19.638829 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:19.939169 env[1311]: time="2024-02-09T19:07:19.939109995Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:19.945890 env[1311]: time="2024-02-09T19:07:19.945842428Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:19.950661 env[1311]: time="2024-02-09T19:07:19.950627652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:19.955096 env[1311]: time="2024-02-09T19:07:19.955063973Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:19.955900 env[1311]: time="2024-02-09T19:07:19.955865877Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:07:19.958183 env[1311]: time="2024-02-09T19:07:19.958154189Z" level=info msg="CreateContainer within sandbox \"052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:07:19.996794 env[1311]: time="2024-02-09T19:07:19.996727278Z" level=info msg="CreateContainer within sandbox \"052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f4fe4caaf2d341de60fff57727aa2d404bae9cf3fca37abd9426ae6787af5fc1\"" Feb 9 19:07:19.997607 env[1311]: time="2024-02-09T19:07:19.997572982Z" level=info msg="StartContainer for \"f4fe4caaf2d341de60fff57727aa2d404bae9cf3fca37abd9426ae6787af5fc1\"" Feb 9 19:07:20.024086 systemd[1]: Started cri-containerd-f4fe4caaf2d341de60fff57727aa2d404bae9cf3fca37abd9426ae6787af5fc1.scope. Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1992 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:20.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634666534636161663264333431646536306666663537373237616132 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit: BPF prog-id=79 op=LOAD Feb 9 19:07:20.037000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000344560 items=0 ppid=1992 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:20.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634666534636161663264333431646536306666663537373237616132 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit: BPF prog-id=80 op=LOAD Feb 9 19:07:20.037000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003445a8 items=0 ppid=1992 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:20.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634666534636161663264333431646536306666663537373237616132 Feb 9 19:07:20.037000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:07:20.037000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:20.037000 audit: BPF prog-id=81 op=LOAD Feb 9 19:07:20.037000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000344638 items=0 ppid=1992 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:20.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634666534636161663264333431646536306666663537373237616132 Feb 9 19:07:20.074860 systemd[1]: cri-containerd-f4fe4caaf2d341de60fff57727aa2d404bae9cf3fca37abd9426ae6787af5fc1.scope: Deactivated successfully. Feb 9 19:07:20.076526 env[1311]: time="2024-02-09T19:07:20.076483164Z" level=info msg="StartContainer for \"f4fe4caaf2d341de60fff57727aa2d404bae9cf3fca37abd9426ae6787af5fc1\" returns successfully" Feb 9 19:07:20.078000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:07:20.096010 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f4fe4caaf2d341de60fff57727aa2d404bae9cf3fca37abd9426ae6787af5fc1-rootfs.mount: Deactivated successfully. Feb 9 19:07:20.398545 kubelet[1868]: E0209 19:07:20.398476 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:20.703619 kubelet[1868]: I0209 19:07:20.703464 1868 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-d6lzr" podStartSLOduration=-9.223372025151346e+09 pod.CreationTimestamp="2024-02-09 19:07:09 +0000 UTC" firstStartedPulling="2024-02-09 19:07:15.199869652 +0000 UTC m=+19.068253383" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:07:17.701881172 +0000 UTC m=+21.570264803" watchObservedRunningTime="2024-02-09 19:07:20.703429198 +0000 UTC m=+24.571812929" Feb 9 19:07:20.852765 env[1311]: time="2024-02-09T19:07:20.852670321Z" level=info msg="shim disconnected" id=f4fe4caaf2d341de60fff57727aa2d404bae9cf3fca37abd9426ae6787af5fc1 Feb 9 19:07:20.852765 env[1311]: time="2024-02-09T19:07:20.852749421Z" level=warning msg="cleaning up after shim disconnected" id=f4fe4caaf2d341de60fff57727aa2d404bae9cf3fca37abd9426ae6787af5fc1 namespace=k8s.io Feb 9 19:07:20.852765 env[1311]: time="2024-02-09T19:07:20.852765221Z" level=info msg="cleaning up dead shim" Feb 9 19:07:20.862995 env[1311]: time="2024-02-09T19:07:20.862931070Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:07:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2297 runtime=io.containerd.runc.v2\n" Feb 9 19:07:21.399496 kubelet[1868]: E0209 19:07:21.399425 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:21.639605 kubelet[1868]: E0209 19:07:21.639536 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:21.691411 env[1311]: time="2024-02-09T19:07:21.691216330Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:07:22.399960 kubelet[1868]: E0209 19:07:22.399903 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:23.400682 kubelet[1868]: E0209 19:07:23.400621 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:23.545669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4286106029.mount: Deactivated successfully. Feb 9 19:07:23.639783 kubelet[1868]: E0209 19:07:23.639420 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:24.400993 kubelet[1868]: E0209 19:07:24.400945 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:25.401968 kubelet[1868]: E0209 19:07:25.401827 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:25.638909 kubelet[1868]: E0209 19:07:25.638862 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:26.403086 kubelet[1868]: E0209 19:07:26.403037 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:27.403547 kubelet[1868]: E0209 19:07:27.403498 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:27.639161 kubelet[1868]: E0209 19:07:27.639112 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:28.403763 kubelet[1868]: E0209 19:07:28.403698 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:28.649026 env[1311]: time="2024-02-09T19:07:28.648918265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:28.658737 env[1311]: time="2024-02-09T19:07:28.658619606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:28.662281 env[1311]: time="2024-02-09T19:07:28.662245722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:28.666093 env[1311]: time="2024-02-09T19:07:28.666034438Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:28.666869 env[1311]: time="2024-02-09T19:07:28.666838042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:07:28.668937 env[1311]: time="2024-02-09T19:07:28.668906551Z" level=info msg="CreateContainer within sandbox \"052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:07:28.706818 env[1311]: time="2024-02-09T19:07:28.706777114Z" level=info msg="CreateContainer within sandbox \"052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d\"" Feb 9 19:07:28.707295 env[1311]: time="2024-02-09T19:07:28.707268316Z" level=info msg="StartContainer for \"435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d\"" Feb 9 19:07:28.732591 systemd[1]: run-containerd-runc-k8s.io-435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d-runc.zJp6kb.mount: Deactivated successfully. Feb 9 19:07:28.734448 systemd[1]: Started cri-containerd-435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d.scope. Feb 9 19:07:28.765614 kernel: kauditd_printk_skb: 371 callbacks suppressed Feb 9 19:07:28.765780 kernel: audit: type=1400 audit(1707505648.748:670): avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.748000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.748000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1992 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:28.784914 kernel: audit: type=1300 audit(1707505648.748:670): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1992 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:28.803552 kernel: audit: type=1327 audit(1707505648.748:670): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356533333134623634353630646162303936336338613139633433 Feb 9 19:07:28.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356533333134623634353630646162303936336338613139633433 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.816016 kernel: audit: type=1400 audit(1707505648.751:671): avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.818886 env[1311]: time="2024-02-09T19:07:28.818842797Z" level=info msg="StartContainer for \"435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d\" returns successfully" Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.833488 kernel: audit: type=1400 audit(1707505648.751:671): avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.843414 kernel: audit: type=1400 audit(1707505648.751:671): avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.843471 kernel: audit: type=1400 audit(1707505648.751:671): avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.868203 kernel: audit: type=1400 audit(1707505648.751:671): avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.895951 kernel: audit: type=1400 audit(1707505648.751:671): avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.896062 kernel: audit: type=1400 audit(1707505648.751:671): avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.751000 audit: BPF prog-id=82 op=LOAD Feb 9 19:07:28.751000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e0310 items=0 ppid=1992 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:28.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356533333134623634353630646162303936336338613139633433 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit: BPF prog-id=83 op=LOAD Feb 9 19:07:28.764000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e0358 items=0 ppid=1992 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:28.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356533333134623634353630646162303936336338613139633433 Feb 9 19:07:28.764000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:07:28.764000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:28.764000 audit: BPF prog-id=84 op=LOAD Feb 9 19:07:28.764000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e03e8 items=0 ppid=1992 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:28.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356533333134623634353630646162303936336338613139633433 Feb 9 19:07:29.404573 kubelet[1868]: E0209 19:07:29.404470 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:29.638651 kubelet[1868]: E0209 19:07:29.638612 1868 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:30.405425 kubelet[1868]: E0209 19:07:30.405305 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:30.569031 env[1311]: time="2024-02-09T19:07:30.568960318Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:07:30.571792 systemd[1]: cri-containerd-435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d.scope: Deactivated successfully. Feb 9 19:07:30.575000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:07:30.591405 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d-rootfs.mount: Deactivated successfully. Feb 9 19:07:30.649935 kubelet[1868]: I0209 19:07:30.649900 1868 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:07:31.406341 kubelet[1868]: E0209 19:07:31.406288 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:31.644299 systemd[1]: Created slice kubepods-besteffort-podae224fc7_f214_4a1f_b1d8_f57095e2412a.slice. Feb 9 19:07:31.647187 env[1311]: time="2024-02-09T19:07:31.647143709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pqcjc,Uid:ae224fc7-f214-4a1f-b1d8-f57095e2412a,Namespace:calico-system,Attempt:0,}" Feb 9 19:07:32.227575 env[1311]: time="2024-02-09T19:07:32.227522702Z" level=info msg="shim disconnected" id=435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d Feb 9 19:07:32.227575 env[1311]: time="2024-02-09T19:07:32.227569102Z" level=warning msg="cleaning up after shim disconnected" id=435e3314b64560dab0963c8a19c43b5088b31d5080490e432999d533f0f0944d namespace=k8s.io Feb 9 19:07:32.227575 env[1311]: time="2024-02-09T19:07:32.227580702Z" level=info msg="cleaning up dead shim" Feb 9 19:07:32.243697 env[1311]: time="2024-02-09T19:07:32.243652868Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:07:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2362 runtime=io.containerd.runc.v2\n" Feb 9 19:07:32.290579 env[1311]: time="2024-02-09T19:07:32.290502459Z" level=error msg="Failed to destroy network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:32.292445 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05-shm.mount: Deactivated successfully. Feb 9 19:07:32.293545 env[1311]: time="2024-02-09T19:07:32.293492172Z" level=error msg="encountered an error cleaning up failed sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:32.293668 env[1311]: time="2024-02-09T19:07:32.293562772Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pqcjc,Uid:ae224fc7-f214-4a1f-b1d8-f57095e2412a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:32.293883 kubelet[1868]: E0209 19:07:32.293857 1868 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:32.293980 kubelet[1868]: E0209 19:07:32.293937 1868 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pqcjc" Feb 9 19:07:32.293980 kubelet[1868]: E0209 19:07:32.293973 1868 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pqcjc" Feb 9 19:07:32.294069 kubelet[1868]: E0209 19:07:32.294051 1868 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-pqcjc_calico-system(ae224fc7-f214-4a1f-b1d8-f57095e2412a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-pqcjc_calico-system(ae224fc7-f214-4a1f-b1d8-f57095e2412a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:32.407472 kubelet[1868]: E0209 19:07:32.407409 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:32.713518 env[1311]: time="2024-02-09T19:07:32.712649786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:07:32.715752 kubelet[1868]: I0209 19:07:32.714653 1868 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:32.715922 env[1311]: time="2024-02-09T19:07:32.715507098Z" level=info msg="StopPodSandbox for \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\"" Feb 9 19:07:32.740648 env[1311]: time="2024-02-09T19:07:32.740600301Z" level=error msg="StopPodSandbox for \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\" failed" error="failed to destroy network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:32.741004 kubelet[1868]: E0209 19:07:32.740974 1868 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:32.741126 kubelet[1868]: E0209 19:07:32.741028 1868 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05} Feb 9 19:07:32.741126 kubelet[1868]: E0209 19:07:32.741072 1868 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ae224fc7-f214-4a1f-b1d8-f57095e2412a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:07:32.741126 kubelet[1868]: E0209 19:07:32.741108 1868 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ae224fc7-f214-4a1f-b1d8-f57095e2412a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pqcjc" podUID=ae224fc7-f214-4a1f-b1d8-f57095e2412a Feb 9 19:07:33.408539 kubelet[1868]: E0209 19:07:33.408476 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:34.409607 kubelet[1868]: E0209 19:07:34.409539 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:35.409940 kubelet[1868]: E0209 19:07:35.409870 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:36.384738 kubelet[1868]: E0209 19:07:36.384662 1868 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:36.411003 kubelet[1868]: E0209 19:07:36.410931 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:37.412143 kubelet[1868]: E0209 19:07:37.412059 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:38.263495 kubelet[1868]: I0209 19:07:38.262641 1868 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:07:38.269873 systemd[1]: Created slice kubepods-besteffort-poda5e831eb_1bd7_4ec0_9eda_c3595b58c329.slice. Feb 9 19:07:38.378063 kubelet[1868]: I0209 19:07:38.378000 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7p9s8\" (UniqueName: \"kubernetes.io/projected/a5e831eb-1bd7-4ec0-9eda-c3595b58c329-kube-api-access-7p9s8\") pod \"nginx-deployment-8ffc5cf85-j7bvd\" (UID: \"a5e831eb-1bd7-4ec0-9eda-c3595b58c329\") " pod="default/nginx-deployment-8ffc5cf85-j7bvd" Feb 9 19:07:38.413273 kubelet[1868]: E0209 19:07:38.413172 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:38.575143 env[1311]: time="2024-02-09T19:07:38.574623881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-j7bvd,Uid:a5e831eb-1bd7-4ec0-9eda-c3595b58c329,Namespace:default,Attempt:0,}" Feb 9 19:07:38.749950 env[1311]: time="2024-02-09T19:07:38.749878249Z" level=error msg="Failed to destroy network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:38.754292 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4-shm.mount: Deactivated successfully. Feb 9 19:07:38.755868 env[1311]: time="2024-02-09T19:07:38.755821072Z" level=error msg="encountered an error cleaning up failed sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:38.756026 env[1311]: time="2024-02-09T19:07:38.755996072Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-j7bvd,Uid:a5e831eb-1bd7-4ec0-9eda-c3595b58c329,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:38.756850 kubelet[1868]: E0209 19:07:38.756350 1868 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:38.756850 kubelet[1868]: E0209 19:07:38.756432 1868 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-j7bvd" Feb 9 19:07:38.756850 kubelet[1868]: E0209 19:07:38.756475 1868 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-j7bvd" Feb 9 19:07:38.757098 kubelet[1868]: E0209 19:07:38.756544 1868 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-j7bvd_default(a5e831eb-1bd7-4ec0-9eda-c3595b58c329)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-j7bvd_default(a5e831eb-1bd7-4ec0-9eda-c3595b58c329)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-j7bvd" podUID=a5e831eb-1bd7-4ec0-9eda-c3595b58c329 Feb 9 19:07:39.250075 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1095837064.mount: Deactivated successfully. Feb 9 19:07:39.378799 env[1311]: time="2024-02-09T19:07:39.378739530Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:39.389115 env[1311]: time="2024-02-09T19:07:39.389061869Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:39.393745 env[1311]: time="2024-02-09T19:07:39.393698086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:39.398742 env[1311]: time="2024-02-09T19:07:39.398703405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:39.399111 env[1311]: time="2024-02-09T19:07:39.399077607Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:07:39.406033 env[1311]: time="2024-02-09T19:07:39.405998433Z" level=info msg="CreateContainer within sandbox \"052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:07:39.413704 kubelet[1868]: E0209 19:07:39.413649 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:39.445961 env[1311]: time="2024-02-09T19:07:39.445906283Z" level=info msg="CreateContainer within sandbox \"052f1411099a744033540bafd2560bb0895f055909ffb8631c6ecb4ca8a6b62a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b8620f662e91be34a5c0677e86efd491d66580b6a2ccbf6b7f345e7dd9415e86\"" Feb 9 19:07:39.446686 env[1311]: time="2024-02-09T19:07:39.446653186Z" level=info msg="StartContainer for \"b8620f662e91be34a5c0677e86efd491d66580b6a2ccbf6b7f345e7dd9415e86\"" Feb 9 19:07:39.464990 systemd[1]: Started cri-containerd-b8620f662e91be34a5c0677e86efd491d66580b6a2ccbf6b7f345e7dd9415e86.scope. Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.497195 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:07:39.497299 kernel: audit: type=1400 audit(1707505659.483:677): avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.501443 kernel: audit: type=1300 audit(1707505659.483:677): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1992 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:39.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1992 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:39.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363230663636326539316265333461356330363737653836656664 Feb 9 19:07:39.537049 kernel: audit: type=1327 audit(1707505659.483:677): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363230663636326539316265333461356330363737653836656664 Feb 9 19:07:39.537154 kernel: audit: type=1400 audit(1707505659.483:678): avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.576393 kernel: audit: type=1400 audit(1707505659.483:678): avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.576525 kernel: audit: type=1400 audit(1707505659.483:678): avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.605026 kernel: audit: type=1400 audit(1707505659.483:678): avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.605183 kernel: audit: type=1400 audit(1707505659.483:678): avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.605222 kernel: audit: type=1400 audit(1707505659.483:678): avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.618783 env[1311]: time="2024-02-09T19:07:39.618708034Z" level=info msg="StartContainer for \"b8620f662e91be34a5c0677e86efd491d66580b6a2ccbf6b7f345e7dd9415e86\" returns successfully" Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.630862 kernel: audit: type=1400 audit(1707505659.483:678): avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.483000 audit: BPF prog-id=85 op=LOAD Feb 9 19:07:39.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000aace0 items=0 ppid=1992 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:39.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363230663636326539316265333461356330363737653836656664 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.500000 audit: BPF prog-id=86 op=LOAD Feb 9 19:07:39.500000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000aad28 items=0 ppid=1992 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:39.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363230663636326539316265333461356330363737653836656664 Feb 9 19:07:39.519000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:07:39.519000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:39.519000 audit: BPF prog-id=87 op=LOAD Feb 9 19:07:39.519000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000aadb8 items=0 ppid=1992 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:39.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363230663636326539316265333461356330363737653836656664 Feb 9 19:07:39.731342 kubelet[1868]: I0209 19:07:39.731294 1868 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:39.732039 env[1311]: time="2024-02-09T19:07:39.731972261Z" level=info msg="StopPodSandbox for \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\"" Feb 9 19:07:39.797783 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:07:39.797969 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:07:39.808595 env[1311]: time="2024-02-09T19:07:39.808525850Z" level=error msg="StopPodSandbox for \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\" failed" error="failed to destroy network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:07:39.809405 kubelet[1868]: E0209 19:07:39.809171 1868 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:39.809405 kubelet[1868]: E0209 19:07:39.809246 1868 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4} Feb 9 19:07:39.809405 kubelet[1868]: E0209 19:07:39.809308 1868 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a5e831eb-1bd7-4ec0-9eda-c3595b58c329\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:07:39.809405 kubelet[1868]: E0209 19:07:39.809349 1868 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a5e831eb-1bd7-4ec0-9eda-c3595b58c329\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-j7bvd" podUID=a5e831eb-1bd7-4ec0-9eda-c3595b58c329 Feb 9 19:07:40.413847 kubelet[1868]: E0209 19:07:40.413785 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:40.755622 systemd[1]: run-containerd-runc-k8s.io-b8620f662e91be34a5c0677e86efd491d66580b6a2ccbf6b7f345e7dd9415e86-runc.xDxb8p.mount: Deactivated successfully. Feb 9 19:07:41.049000 audit[2619]: AVC avc: denied { write } for pid=2619 comm="tee" name="fd" dev="proc" ino=23567 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:07:41.056000 audit[2632]: AVC avc: denied { write } for pid=2632 comm="tee" name="fd" dev="proc" ino=22327 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:07:41.049000 audit[2619]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb9e4297b a2=241 a3=1b6 items=1 ppid=2609 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.056000 audit[2632]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdebe9696b a2=241 a3=1b6 items=1 ppid=2595 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.056000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:07:41.056000 audit: PATH item=0 name="/dev/fd/63" inode=22315 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:07:41.056000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:07:41.049000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:07:41.049000 audit: PATH item=0 name="/dev/fd/63" inode=22309 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:07:41.049000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:07:41.065000 audit[2627]: AVC avc: denied { write } for pid=2627 comm="tee" name="fd" dev="proc" ino=23580 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:07:41.065000 audit[2627]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe45a0196a a2=241 a3=1b6 items=1 ppid=2597 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.065000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:07:41.065000 audit: PATH item=0 name="/dev/fd/63" inode=22312 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:07:41.065000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:07:41.077000 audit[2637]: AVC avc: denied { write } for pid=2637 comm="tee" name="fd" dev="proc" ino=22339 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:07:41.077000 audit[2637]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc44b6a97c a2=241 a3=1b6 items=1 ppid=2600 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.077000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:07:41.077000 audit: PATH item=0 name="/dev/fd/63" inode=23576 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:07:41.077000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:07:41.084000 audit[2649]: AVC avc: denied { write } for pid=2649 comm="tee" name="fd" dev="proc" ino=22343 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:07:41.086000 audit[2652]: AVC avc: denied { write } for pid=2652 comm="tee" name="fd" dev="proc" ino=23595 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:07:41.088000 audit[2657]: AVC avc: denied { write } for pid=2657 comm="tee" name="fd" dev="proc" ino=23598 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:07:41.086000 audit[2652]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffaa49e97a a2=241 a3=1b6 items=1 ppid=2602 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.086000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:07:41.086000 audit: PATH item=0 name="/dev/fd/63" inode=23586 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:07:41.086000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:07:41.084000 audit[2649]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde393e97a a2=241 a3=1b6 items=1 ppid=2604 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.084000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:07:41.084000 audit: PATH item=0 name="/dev/fd/63" inode=22333 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:07:41.084000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:07:41.088000 audit[2657]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8e29e97a a2=241 a3=1b6 items=1 ppid=2614 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.088000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:07:41.088000 audit: PATH item=0 name="/dev/fd/63" inode=23589 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:07:41.088000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:07:41.323403 kernel: Initializing XFRM netlink socket Feb 9 19:07:41.414500 kubelet[1868]: E0209 19:07:41.414315 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit: BPF prog-id=88 op=LOAD Feb 9 19:07:41.460000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff13985060 a2=70 a3=7f2746c6e000 items=0 ppid=2615 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:07:41.460000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit: BPF prog-id=89 op=LOAD Feb 9 19:07:41.460000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff13985060 a2=70 a3=6e items=0 ppid=2615 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:07:41.460000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff13985010 a2=70 a3=7fff13985060 items=0 ppid=2615 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit: BPF prog-id=90 op=LOAD Feb 9 19:07:41.460000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff13984ff0 a2=70 a3=7fff13985060 items=0 ppid=2615 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:07:41.460000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff139850d0 a2=70 a3=0 items=0 ppid=2615 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff139850c0 a2=70 a3=0 items=0 ppid=2615 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:07:41.460000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.460000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff13985100 a2=70 a3=0 items=0 ppid=2615 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.464000 audit: BPF prog-id=91 op=LOAD Feb 9 19:07:41.464000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff13985020 a2=70 a3=ffffffff items=0 ppid=2615 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.464000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:07:41.472000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.472000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84ba5e40 a2=70 a3=fff80800 items=0 ppid=2615 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:07:41.472000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:41.472000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84ba5d10 a2=70 a3=3 items=0 ppid=2615 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:07:41.482000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:07:41.576000 audit[2761]: NETFILTER_CFG table=mangle:85 family=2 entries=19 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:07:41.576000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffeb132fbf0 a2=0 a3=7ffeb132fbdc items=0 ppid=2615 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.576000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:07:41.580000 audit[2762]: NETFILTER_CFG table=nat:86 family=2 entries=16 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:07:41.580000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc982201d0 a2=0 a3=55def9001000 items=0 ppid=2615 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:07:41.584000 audit[2767]: NETFILTER_CFG table=filter:87 family=2 entries=39 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:07:41.584000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffd08bb8e10 a2=0 a3=558a75087000 items=0 ppid=2615 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.584000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:07:41.593000 audit[2760]: NETFILTER_CFG table=raw:88 family=2 entries=19 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:07:41.593000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe07afe0e0 a2=0 a3=55d29ecd5000 items=0 ppid=2615 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:41.593000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:07:42.396196 systemd-networkd[1452]: vxlan.calico: Link UP Feb 9 19:07:42.396210 systemd-networkd[1452]: vxlan.calico: Gained carrier Feb 9 19:07:42.414887 kubelet[1868]: E0209 19:07:42.414850 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:43.415352 kubelet[1868]: E0209 19:07:43.415286 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:43.827667 systemd-networkd[1452]: vxlan.calico: Gained IPv6LL Feb 9 19:07:44.415527 kubelet[1868]: E0209 19:07:44.415475 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:45.416652 kubelet[1868]: E0209 19:07:45.416589 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:46.416929 kubelet[1868]: E0209 19:07:46.416865 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:47.417498 kubelet[1868]: E0209 19:07:47.417438 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:47.639692 env[1311]: time="2024-02-09T19:07:47.639631021Z" level=info msg="StopPodSandbox for \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\"" Feb 9 19:07:47.694479 kubelet[1868]: I0209 19:07:47.694348 1868 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-zgrxs" podStartSLOduration=-9.223371998160496e+09 pod.CreationTimestamp="2024-02-09 19:07:09 +0000 UTC" firstStartedPulling="2024-02-09 19:07:15.204923579 +0000 UTC m=+19.073307210" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:07:39.743386504 +0000 UTC m=+43.611770135" watchObservedRunningTime="2024-02-09 19:07:47.694280611 +0000 UTC m=+51.562664342" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.692 [INFO][2801] k8s.go 578: Cleaning up netns ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.692 [INFO][2801] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" iface="eth0" netns="/var/run/netns/cni-1b53478d-69da-a035-1488-e7377ac8768e" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.692 [INFO][2801] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" iface="eth0" netns="/var/run/netns/cni-1b53478d-69da-a035-1488-e7377ac8768e" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.693 [INFO][2801] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" iface="eth0" netns="/var/run/netns/cni-1b53478d-69da-a035-1488-e7377ac8768e" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.693 [INFO][2801] k8s.go 585: Releasing IP address(es) ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.693 [INFO][2801] utils.go 188: Calico CNI releasing IP address ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.712 [INFO][2807] ipam_plugin.go 415: Releasing address using handleID ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.712 [INFO][2807] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.712 [INFO][2807] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.724 [WARNING][2807] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.724 [INFO][2807] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.726 [INFO][2807] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:07:47.728397 env[1311]: 2024-02-09 19:07:47.727 [INFO][2801] k8s.go 591: Teardown processing complete. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:47.732179 env[1311]: time="2024-02-09T19:07:47.730921939Z" level=info msg="TearDown network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\" successfully" Feb 9 19:07:47.732179 env[1311]: time="2024-02-09T19:07:47.730974939Z" level=info msg="StopPodSandbox for \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\" returns successfully" Feb 9 19:07:47.732179 env[1311]: time="2024-02-09T19:07:47.731952542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pqcjc,Uid:ae224fc7-f214-4a1f-b1d8-f57095e2412a,Namespace:calico-system,Attempt:1,}" Feb 9 19:07:47.730654 systemd[1]: run-netns-cni\x2d1b53478d\x2d69da\x2da035\x2d1488\x2de7377ac8768e.mount: Deactivated successfully. Feb 9 19:07:47.892760 systemd-networkd[1452]: cali689ed6a68a8: Link UP Feb 9 19:07:47.904128 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:07:47.904241 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali689ed6a68a8: link becomes ready Feb 9 19:07:47.904573 systemd-networkd[1452]: cali689ed6a68a8: Gained carrier Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.821 [INFO][2814] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.43-k8s-csi--node--driver--pqcjc-eth0 csi-node-driver- calico-system ae224fc7-f214-4a1f-b1d8-f57095e2412a 1287 0 2024-02-09 19:07:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.43 csi-node-driver-pqcjc eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali689ed6a68a8 [] []}} ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Namespace="calico-system" Pod="csi-node-driver-pqcjc" WorkloadEndpoint="10.200.8.43-k8s-csi--node--driver--pqcjc-" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.821 [INFO][2814] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Namespace="calico-system" Pod="csi-node-driver-pqcjc" WorkloadEndpoint="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.847 [INFO][2824] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" HandleID="k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.858 [INFO][2824] ipam_plugin.go 268: Auto assigning IP ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" HandleID="k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a10), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.43", "pod":"csi-node-driver-pqcjc", "timestamp":"2024-02-09 19:07:47.847101143 +0000 UTC"}, Hostname:"10.200.8.43", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.859 [INFO][2824] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.859 [INFO][2824] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.859 [INFO][2824] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.43' Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.861 [INFO][2824] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.864 [INFO][2824] ipam.go 372: Looking up existing affinities for host host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.868 [INFO][2824] ipam.go 489: Trying affinity for 192.168.33.192/26 host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.869 [INFO][2824] ipam.go 155: Attempting to load block cidr=192.168.33.192/26 host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.871 [INFO][2824] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.192/26 host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.871 [INFO][2824] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.192/26 handle="k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.878 [INFO][2824] ipam.go 1682: Creating new handle: k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1 Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.883 [INFO][2824] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.192/26 handle="k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.887 [INFO][2824] ipam.go 1216: Successfully claimed IPs: [192.168.33.193/26] block=192.168.33.192/26 handle="k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.887 [INFO][2824] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.193/26] handle="k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" host="10.200.8.43" Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.887 [INFO][2824] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:07:47.920944 env[1311]: 2024-02-09 19:07:47.887 [INFO][2824] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.193/26] IPv6=[] ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" HandleID="k8s-pod-network.9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.921938 env[1311]: 2024-02-09 19:07:47.889 [INFO][2814] k8s.go 385: Populated endpoint ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Namespace="calico-system" Pod="csi-node-driver-pqcjc" WorkloadEndpoint="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-csi--node--driver--pqcjc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ae224fc7-f214-4a1f-b1d8-f57095e2412a", ResourceVersion:"1287", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 7, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"", Pod:"csi-node-driver-pqcjc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali689ed6a68a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:07:47.921938 env[1311]: 2024-02-09 19:07:47.889 [INFO][2814] k8s.go 386: Calico CNI using IPs: [192.168.33.193/32] ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Namespace="calico-system" Pod="csi-node-driver-pqcjc" WorkloadEndpoint="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.921938 env[1311]: 2024-02-09 19:07:47.889 [INFO][2814] dataplane_linux.go 68: Setting the host side veth name to cali689ed6a68a8 ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Namespace="calico-system" Pod="csi-node-driver-pqcjc" WorkloadEndpoint="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.921938 env[1311]: 2024-02-09 19:07:47.905 [INFO][2814] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Namespace="calico-system" Pod="csi-node-driver-pqcjc" WorkloadEndpoint="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.921938 env[1311]: 2024-02-09 19:07:47.906 [INFO][2814] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Namespace="calico-system" Pod="csi-node-driver-pqcjc" WorkloadEndpoint="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-csi--node--driver--pqcjc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ae224fc7-f214-4a1f-b1d8-f57095e2412a", ResourceVersion:"1287", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 7, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1", Pod:"csi-node-driver-pqcjc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali689ed6a68a8", MAC:"5e:18:27:93:bb:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:07:47.921938 env[1311]: 2024-02-09 19:07:47.913 [INFO][2814] k8s.go 491: Wrote updated endpoint to datastore ContainerID="9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1" Namespace="calico-system" Pod="csi-node-driver-pqcjc" WorkloadEndpoint="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:47.956839 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 19:07:47.956983 kernel: audit: type=1325 audit(1707505667.938:708): table=filter:89 family=2 entries=36 op=nft_register_chain pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:07:47.938000 audit[2853]: NETFILTER_CFG table=filter:89 family=2 entries=36 op=nft_register_chain pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:07:47.957180 env[1311]: time="2024-02-09T19:07:47.941010170Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:07:47.957180 env[1311]: time="2024-02-09T19:07:47.941073970Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:07:47.957180 env[1311]: time="2024-02-09T19:07:47.941099670Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:07:47.957180 env[1311]: time="2024-02-09T19:07:47.941225171Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1 pid=2859 runtime=io.containerd.runc.v2 Feb 9 19:07:47.966612 systemd[1]: run-containerd-runc-k8s.io-9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1-runc.vheMyf.mount: Deactivated successfully. Feb 9 19:07:47.938000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd83ac3a60 a2=0 a3=7ffd83ac3a4c items=0 ppid=2615 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:47.977611 systemd[1]: Started cri-containerd-9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1.scope. Feb 9 19:07:47.938000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:07:48.001581 kernel: audit: type=1300 audit(1707505667.938:708): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd83ac3a60 a2=0 a3=7ffd83ac3a4c items=0 ppid=2615 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:48.001725 kernel: audit: type=1327 audit(1707505667.938:708): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.027221 kernel: audit: type=1400 audit(1707505667.988:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.027320 kernel: audit: type=1400 audit(1707505667.988:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.027352 kernel: audit: type=1400 audit(1707505667.988:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.051254 kernel: audit: type=1400 audit(1707505667.988:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.051354 kernel: audit: type=1400 audit(1707505667.988:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.052723 env[1311]: time="2024-02-09T19:07:48.052677357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pqcjc,Uid:ae224fc7-f214-4a1f-b1d8-f57095e2412a,Namespace:calico-system,Attempt:1,} returns sandbox id \"9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1\"" Feb 9 19:07:48.054685 env[1311]: time="2024-02-09T19:07:48.054656664Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.073570 kernel: audit: type=1400 audit(1707505667.988:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.074428 kernel: audit: type=1400 audit(1707505667.988:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:47.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.000000 audit: BPF prog-id=92 op=LOAD Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2859 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:48.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666564376334323131313761333634396638333463393363366361 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2859 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:48.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666564376334323131313761333634396638333463393363366361 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit: BPF prog-id=93 op=LOAD Feb 9 19:07:48.001000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030e370 items=0 ppid=2859 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:48.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666564376334323131313761333634396638333463393363366361 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit: BPF prog-id=94 op=LOAD Feb 9 19:07:48.001000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030e3b8 items=0 ppid=2859 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:48.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666564376334323131313761333634396638333463393363366361 Feb 9 19:07:48.001000 audit: BPF prog-id=94 op=UNLOAD Feb 9 19:07:48.001000 audit: BPF prog-id=93 op=UNLOAD Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:48.001000 audit: BPF prog-id=95 op=LOAD Feb 9 19:07:48.001000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030e7c8 items=0 ppid=2859 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:48.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666564376334323131313761333634396638333463393363366361 Feb 9 19:07:48.418166 kubelet[1868]: E0209 19:07:48.418099 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:49.331598 systemd-networkd[1452]: cali689ed6a68a8: Gained IPv6LL Feb 9 19:07:49.419111 kubelet[1868]: E0209 19:07:49.419047 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:49.874198 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3089866627.mount: Deactivated successfully. Feb 9 19:07:50.419994 kubelet[1868]: E0209 19:07:50.419773 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:50.427602 env[1311]: time="2024-02-09T19:07:50.427554690Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:50.432391 env[1311]: time="2024-02-09T19:07:50.432340306Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:50.436016 env[1311]: time="2024-02-09T19:07:50.435982219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:50.439385 env[1311]: time="2024-02-09T19:07:50.439346930Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:50.439860 env[1311]: time="2024-02-09T19:07:50.439829732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:07:50.442186 env[1311]: time="2024-02-09T19:07:50.442157040Z" level=info msg="CreateContainer within sandbox \"9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:07:50.488265 env[1311]: time="2024-02-09T19:07:50.488201996Z" level=info msg="CreateContainer within sandbox \"9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e032d3d62674c93b71756b5acca4805d805f55a85352f8a2e5846513eab489cd\"" Feb 9 19:07:50.489067 env[1311]: time="2024-02-09T19:07:50.489030298Z" level=info msg="StartContainer for \"e032d3d62674c93b71756b5acca4805d805f55a85352f8a2e5846513eab489cd\"" Feb 9 19:07:50.513942 systemd[1]: Started cri-containerd-e032d3d62674c93b71756b5acca4805d805f55a85352f8a2e5846513eab489cd.scope. Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2859 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:50.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333264336436323637346339336237313735366235616363613438 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit: BPF prog-id=96 op=LOAD Feb 9 19:07:50.530000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8840 items=0 ppid=2859 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:50.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333264336436323637346339336237313735366235616363613438 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit: BPF prog-id=97 op=LOAD Feb 9 19:07:50.530000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8888 items=0 ppid=2859 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:50.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333264336436323637346339336237313735366235616363613438 Feb 9 19:07:50.530000 audit: BPF prog-id=97 op=UNLOAD Feb 9 19:07:50.530000 audit: BPF prog-id=96 op=UNLOAD Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:50.530000 audit: BPF prog-id=98 op=LOAD Feb 9 19:07:50.530000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8918 items=0 ppid=2859 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:50.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530333264336436323637346339336237313735366235616363613438 Feb 9 19:07:50.555494 env[1311]: time="2024-02-09T19:07:50.555403123Z" level=info msg="StartContainer for \"e032d3d62674c93b71756b5acca4805d805f55a85352f8a2e5846513eab489cd\" returns successfully" Feb 9 19:07:50.556716 env[1311]: time="2024-02-09T19:07:50.556680128Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:07:50.640503 env[1311]: time="2024-02-09T19:07:50.640436212Z" level=info msg="StopPodSandbox for \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\"" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.679 [INFO][2941] k8s.go 578: Cleaning up netns ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.679 [INFO][2941] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" iface="eth0" netns="/var/run/netns/cni-2468856a-2073-b695-ca43-86df7452a889" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.680 [INFO][2941] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" iface="eth0" netns="/var/run/netns/cni-2468856a-2073-b695-ca43-86df7452a889" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.680 [INFO][2941] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" iface="eth0" netns="/var/run/netns/cni-2468856a-2073-b695-ca43-86df7452a889" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.680 [INFO][2941] k8s.go 585: Releasing IP address(es) ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.680 [INFO][2941] utils.go 188: Calico CNI releasing IP address ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.698 [INFO][2947] ipam_plugin.go 415: Releasing address using handleID ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.698 [INFO][2947] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.698 [INFO][2947] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.705 [WARNING][2947] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.705 [INFO][2947] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.706 [INFO][2947] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:07:50.708935 env[1311]: 2024-02-09 19:07:50.707 [INFO][2941] k8s.go 591: Teardown processing complete. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:50.709892 env[1311]: time="2024-02-09T19:07:50.709835047Z" level=info msg="TearDown network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\" successfully" Feb 9 19:07:50.710032 env[1311]: time="2024-02-09T19:07:50.710008847Z" level=info msg="StopPodSandbox for \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\" returns successfully" Feb 9 19:07:50.710959 env[1311]: time="2024-02-09T19:07:50.710923150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-j7bvd,Uid:a5e831eb-1bd7-4ec0-9eda-c3595b58c329,Namespace:default,Attempt:1,}" Feb 9 19:07:50.858945 systemd[1]: run-containerd-runc-k8s.io-e032d3d62674c93b71756b5acca4805d805f55a85352f8a2e5846513eab489cd-runc.BxB26G.mount: Deactivated successfully. Feb 9 19:07:50.859066 systemd[1]: run-netns-cni\x2d2468856a\x2d2073\x2db695\x2dca43\x2d86df7452a889.mount: Deactivated successfully. Feb 9 19:07:50.873150 systemd-networkd[1452]: cali3099ec8e201: Link UP Feb 9 19:07:50.884722 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:07:50.884850 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3099ec8e201: link becomes ready Feb 9 19:07:50.888239 systemd-networkd[1452]: cali3099ec8e201: Gained carrier Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.796 [INFO][2953] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0 nginx-deployment-8ffc5cf85- default a5e831eb-1bd7-4ec0-9eda-c3595b58c329 1305 0 2024-02-09 19:07:38 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.43 nginx-deployment-8ffc5cf85-j7bvd eth0 default [] [] [kns.default ksa.default.default] cali3099ec8e201 [] []}} ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Namespace="default" Pod="nginx-deployment-8ffc5cf85-j7bvd" WorkloadEndpoint="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.796 [INFO][2953] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Namespace="default" Pod="nginx-deployment-8ffc5cf85-j7bvd" WorkloadEndpoint="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.819 [INFO][2965] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" HandleID="k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.832 [INFO][2965] ipam_plugin.go 268: Auto assigning IP ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" HandleID="k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291ec0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.43", "pod":"nginx-deployment-8ffc5cf85-j7bvd", "timestamp":"2024-02-09 19:07:50.81997622 +0000 UTC"}, Hostname:"10.200.8.43", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.832 [INFO][2965] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.832 [INFO][2965] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.832 [INFO][2965] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.43' Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.835 [INFO][2965] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.839 [INFO][2965] ipam.go 372: Looking up existing affinities for host host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.844 [INFO][2965] ipam.go 489: Trying affinity for 192.168.33.192/26 host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.846 [INFO][2965] ipam.go 155: Attempting to load block cidr=192.168.33.192/26 host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.848 [INFO][2965] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.192/26 host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.848 [INFO][2965] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.192/26 handle="k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.855 [INFO][2965] ipam.go 1682: Creating new handle: k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465 Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.860 [INFO][2965] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.192/26 handle="k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.867 [INFO][2965] ipam.go 1216: Successfully claimed IPs: [192.168.33.194/26] block=192.168.33.192/26 handle="k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.867 [INFO][2965] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.194/26] handle="k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" host="10.200.8.43" Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.867 [INFO][2965] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:07:50.928137 env[1311]: 2024-02-09 19:07:50.867 [INFO][2965] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.194/26] IPv6=[] ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" HandleID="k8s-pod-network.6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.929125 env[1311]: 2024-02-09 19:07:50.869 [INFO][2953] k8s.go 385: Populated endpoint ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Namespace="default" Pod="nginx-deployment-8ffc5cf85-j7bvd" WorkloadEndpoint="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"a5e831eb-1bd7-4ec0-9eda-c3595b58c329", ResourceVersion:"1305", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 7, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-j7bvd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3099ec8e201", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:07:50.929125 env[1311]: 2024-02-09 19:07:50.869 [INFO][2953] k8s.go 386: Calico CNI using IPs: [192.168.33.194/32] ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Namespace="default" Pod="nginx-deployment-8ffc5cf85-j7bvd" WorkloadEndpoint="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.929125 env[1311]: 2024-02-09 19:07:50.869 [INFO][2953] dataplane_linux.go 68: Setting the host side veth name to cali3099ec8e201 ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Namespace="default" Pod="nginx-deployment-8ffc5cf85-j7bvd" WorkloadEndpoint="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.929125 env[1311]: 2024-02-09 19:07:50.889 [INFO][2953] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Namespace="default" Pod="nginx-deployment-8ffc5cf85-j7bvd" WorkloadEndpoint="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.929125 env[1311]: 2024-02-09 19:07:50.889 [INFO][2953] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Namespace="default" Pod="nginx-deployment-8ffc5cf85-j7bvd" WorkloadEndpoint="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"a5e831eb-1bd7-4ec0-9eda-c3595b58c329", ResourceVersion:"1305", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 7, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465", Pod:"nginx-deployment-8ffc5cf85-j7bvd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3099ec8e201", MAC:"c2:bf:7b:01:26:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:07:50.929125 env[1311]: 2024-02-09 19:07:50.926 [INFO][2953] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465" Namespace="default" Pod="nginx-deployment-8ffc5cf85-j7bvd" WorkloadEndpoint="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:50.950306 env[1311]: time="2024-02-09T19:07:50.950212061Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:07:50.950561 env[1311]: time="2024-02-09T19:07:50.950262561Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:07:50.950561 env[1311]: time="2024-02-09T19:07:50.950290961Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:07:50.950845 env[1311]: time="2024-02-09T19:07:50.950803163Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465 pid=3011 runtime=io.containerd.runc.v2 Feb 9 19:07:50.978554 systemd[1]: Started cri-containerd-6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465.scope. Feb 9 19:07:50.980924 systemd[1]: run-containerd-runc-k8s.io-6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465-runc.vzUlwY.mount: Deactivated successfully. Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.008000 audit: BPF prog-id=99 op=LOAD Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3011 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:51.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326339333965303631343935653762666436663338363864633731 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3011 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:51.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326339333965303631343935653762666436663338363864633731 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit: BPF prog-id=100 op=LOAD Feb 9 19:07:51.009000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024380 items=0 ppid=3011 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:51.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326339333965303631343935653762666436663338363864633731 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit: BPF prog-id=101 op=LOAD Feb 9 19:07:51.009000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243c8 items=0 ppid=3011 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:51.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326339333965303631343935653762666436663338363864633731 Feb 9 19:07:51.009000 audit: BPF prog-id=101 op=UNLOAD Feb 9 19:07:51.009000 audit: BPF prog-id=100 op=UNLOAD Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:51.009000 audit: BPF prog-id=102 op=LOAD Feb 9 19:07:51.009000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247d8 items=0 ppid=3011 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:51.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326339333965303631343935653762666436663338363864633731 Feb 9 19:07:51.017000 audit[3040]: NETFILTER_CFG table=filter:90 family=2 entries=40 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:07:51.017000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffc9a04b870 a2=0 a3=7ffc9a04b85c items=0 ppid=2615 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:51.017000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:07:51.043313 env[1311]: time="2024-02-09T19:07:51.043271975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-j7bvd,Uid:a5e831eb-1bd7-4ec0-9eda-c3595b58c329,Namespace:default,Attempt:1,} returns sandbox id \"6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465\"" Feb 9 19:07:51.420992 kubelet[1868]: E0209 19:07:51.420826 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:52.019725 systemd-networkd[1452]: cali3099ec8e201: Gained IPv6LL Feb 9 19:07:52.421490 kubelet[1868]: E0209 19:07:52.421365 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:52.632533 env[1311]: time="2024-02-09T19:07:52.632476198Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:52.642216 env[1311]: time="2024-02-09T19:07:52.642175130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:52.651720 env[1311]: time="2024-02-09T19:07:52.651685362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:52.655885 env[1311]: time="2024-02-09T19:07:52.655847976Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:52.656403 env[1311]: time="2024-02-09T19:07:52.656354077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:07:52.657708 env[1311]: time="2024-02-09T19:07:52.657677682Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:07:52.658436 env[1311]: time="2024-02-09T19:07:52.658401384Z" level=info msg="CreateContainer within sandbox \"9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:07:52.704859 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3112502799.mount: Deactivated successfully. Feb 9 19:07:52.734829 env[1311]: time="2024-02-09T19:07:52.734762039Z" level=info msg="CreateContainer within sandbox \"9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"dd8d2392f572fea20e76ab88106a20e5ef18dc5b173870f6ef5cd80a0bb2a537\"" Feb 9 19:07:52.735669 env[1311]: time="2024-02-09T19:07:52.735630842Z" level=info msg="StartContainer for \"dd8d2392f572fea20e76ab88106a20e5ef18dc5b173870f6ef5cd80a0bb2a537\"" Feb 9 19:07:52.760819 systemd[1]: Started cri-containerd-dd8d2392f572fea20e76ab88106a20e5ef18dc5b173870f6ef5cd80a0bb2a537.scope. Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2859 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:52.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464386432333932663537326665613230653736616238383130366132 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit: BPF prog-id=103 op=LOAD Feb 9 19:07:52.776000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ea100 items=0 ppid=2859 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:52.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464386432333932663537326665613230653736616238383130366132 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit: BPF prog-id=104 op=LOAD Feb 9 19:07:52.776000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ea148 items=0 ppid=2859 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:52.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464386432333932663537326665613230653736616238383130366132 Feb 9 19:07:52.776000 audit: BPF prog-id=104 op=UNLOAD Feb 9 19:07:52.776000 audit: BPF prog-id=103 op=UNLOAD Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:52.776000 audit: BPF prog-id=105 op=LOAD Feb 9 19:07:52.776000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ea1d8 items=0 ppid=2859 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:52.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464386432333932663537326665613230653736616238383130366132 Feb 9 19:07:52.804002 env[1311]: time="2024-02-09T19:07:52.803955069Z" level=info msg="StartContainer for \"dd8d2392f572fea20e76ab88106a20e5ef18dc5b173870f6ef5cd80a0bb2a537\" returns successfully" Feb 9 19:07:53.422177 kubelet[1868]: E0209 19:07:53.422109 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:53.492544 kubelet[1868]: I0209 19:07:53.492510 1868 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:07:53.492544 kubelet[1868]: I0209 19:07:53.492557 1868 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:07:53.784835 kubelet[1868]: I0209 19:07:53.784800 1868 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-pqcjc" podStartSLOduration=-9.223371992070005e+09 pod.CreationTimestamp="2024-02-09 19:07:09 +0000 UTC" firstStartedPulling="2024-02-09 19:07:48.054069062 +0000 UTC m=+51.922452793" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:07:53.784559516 +0000 UTC m=+57.652943147" watchObservedRunningTime="2024-02-09 19:07:53.784770817 +0000 UTC m=+57.653154448" Feb 9 19:07:54.422685 kubelet[1868]: E0209 19:07:54.422636 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:55.423139 kubelet[1868]: E0209 19:07:55.423072 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:56.172128 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1474705775.mount: Deactivated successfully. Feb 9 19:07:56.385498 kubelet[1868]: E0209 19:07:56.385451 1868 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:56.391307 env[1311]: time="2024-02-09T19:07:56.391262227Z" level=info msg="StopPodSandbox for \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\"" Feb 9 19:07:56.424029 kubelet[1868]: E0209 19:07:56.423888 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.455 [WARNING][3110] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-csi--node--driver--pqcjc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ae224fc7-f214-4a1f-b1d8-f57095e2412a", ResourceVersion:"1321", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 7, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1", Pod:"csi-node-driver-pqcjc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali689ed6a68a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.455 [INFO][3110] k8s.go 578: Cleaning up netns ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.455 [INFO][3110] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" iface="eth0" netns="" Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.455 [INFO][3110] k8s.go 585: Releasing IP address(es) ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.455 [INFO][3110] utils.go 188: Calico CNI releasing IP address ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.491 [INFO][3116] ipam_plugin.go 415: Releasing address using handleID ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.491 [INFO][3116] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.492 [INFO][3116] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.505 [WARNING][3116] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.505 [INFO][3116] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.512 [INFO][3116] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:07:56.515070 env[1311]: 2024-02-09 19:07:56.513 [INFO][3110] k8s.go 591: Teardown processing complete. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:56.515762 env[1311]: time="2024-02-09T19:07:56.515102527Z" level=info msg="TearDown network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\" successfully" Feb 9 19:07:56.515762 env[1311]: time="2024-02-09T19:07:56.515135927Z" level=info msg="StopPodSandbox for \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\" returns successfully" Feb 9 19:07:56.515762 env[1311]: time="2024-02-09T19:07:56.515663929Z" level=info msg="RemovePodSandbox for \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\"" Feb 9 19:07:56.515762 env[1311]: time="2024-02-09T19:07:56.515697329Z" level=info msg="Forcibly stopping sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\"" Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.601 [WARNING][3136] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-csi--node--driver--pqcjc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ae224fc7-f214-4a1f-b1d8-f57095e2412a", ResourceVersion:"1321", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 7, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"9afed7c421117a3649f834c93c6ca83f8d1ed3276b3cbd10ea6a59dd851945f1", Pod:"csi-node-driver-pqcjc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali689ed6a68a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.601 [INFO][3136] k8s.go 578: Cleaning up netns ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.601 [INFO][3136] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" iface="eth0" netns="" Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.601 [INFO][3136] k8s.go 585: Releasing IP address(es) ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.601 [INFO][3136] utils.go 188: Calico CNI releasing IP address ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.632 [INFO][3142] ipam_plugin.go 415: Releasing address using handleID ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.632 [INFO][3142] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.632 [INFO][3142] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.646 [WARNING][3142] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.646 [INFO][3142] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" HandleID="k8s-pod-network.55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Workload="10.200.8.43-k8s-csi--node--driver--pqcjc-eth0" Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.648 [INFO][3142] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:07:56.650071 env[1311]: 2024-02-09 19:07:56.649 [INFO][3136] k8s.go 591: Teardown processing complete. ContainerID="55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05" Feb 9 19:07:56.650938 env[1311]: time="2024-02-09T19:07:56.650901866Z" level=info msg="TearDown network for sandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\" successfully" Feb 9 19:07:56.659407 env[1311]: time="2024-02-09T19:07:56.659374793Z" level=info msg="RemovePodSandbox \"55330b1fd0831be3c088515e98a3f380e4305a96fbb8c2e3e2b2996f31b28f05\" returns successfully" Feb 9 19:07:56.660035 env[1311]: time="2024-02-09T19:07:56.660005995Z" level=info msg="StopPodSandbox for \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\"" Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.734 [WARNING][3165] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"a5e831eb-1bd7-4ec0-9eda-c3595b58c329", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 7, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465", Pod:"nginx-deployment-8ffc5cf85-j7bvd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3099ec8e201", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.734 [INFO][3165] k8s.go 578: Cleaning up netns ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.734 [INFO][3165] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" iface="eth0" netns="" Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.734 [INFO][3165] k8s.go 585: Releasing IP address(es) ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.734 [INFO][3165] utils.go 188: Calico CNI releasing IP address ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.777 [INFO][3171] ipam_plugin.go 415: Releasing address using handleID ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.777 [INFO][3171] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.777 [INFO][3171] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.785 [WARNING][3171] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.785 [INFO][3171] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.786 [INFO][3171] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:07:56.789420 env[1311]: 2024-02-09 19:07:56.788 [INFO][3165] k8s.go 591: Teardown processing complete. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:56.790270 env[1311]: time="2024-02-09T19:07:56.790232516Z" level=info msg="TearDown network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\" successfully" Feb 9 19:07:56.790387 env[1311]: time="2024-02-09T19:07:56.790349516Z" level=info msg="StopPodSandbox for \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\" returns successfully" Feb 9 19:07:56.790802 env[1311]: time="2024-02-09T19:07:56.790773118Z" level=info msg="RemovePodSandbox for \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\"" Feb 9 19:07:56.790972 env[1311]: time="2024-02-09T19:07:56.790931118Z" level=info msg="Forcibly stopping sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\"" Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.858 [WARNING][3192] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"a5e831eb-1bd7-4ec0-9eda-c3595b58c329", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 7, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465", Pod:"nginx-deployment-8ffc5cf85-j7bvd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3099ec8e201", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.858 [INFO][3192] k8s.go 578: Cleaning up netns ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.858 [INFO][3192] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" iface="eth0" netns="" Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.859 [INFO][3192] k8s.go 585: Releasing IP address(es) ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.859 [INFO][3192] utils.go 188: Calico CNI releasing IP address ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.883 [INFO][3198] ipam_plugin.go 415: Releasing address using handleID ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.884 [INFO][3198] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.884 [INFO][3198] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.892 [WARNING][3198] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.892 [INFO][3198] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" HandleID="k8s-pod-network.9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Workload="10.200.8.43-k8s-nginx--deployment--8ffc5cf85--j7bvd-eth0" Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.893 [INFO][3198] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:07:56.896707 env[1311]: 2024-02-09 19:07:56.895 [INFO][3192] k8s.go 591: Teardown processing complete. ContainerID="9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4" Feb 9 19:07:56.897497 env[1311]: time="2024-02-09T19:07:56.897452162Z" level=info msg="TearDown network for sandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\" successfully" Feb 9 19:07:56.907916 env[1311]: time="2024-02-09T19:07:56.907869796Z" level=info msg="RemovePodSandbox \"9fa8b1e8239ac82773e992adff7319639ba341e5026eaee6319a18ebeac573c4\" returns successfully" Feb 9 19:07:57.337728 env[1311]: time="2024-02-09T19:07:57.337670276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:57.352124 env[1311]: time="2024-02-09T19:07:57.352073223Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:57.356194 env[1311]: time="2024-02-09T19:07:57.356138936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:57.362990 env[1311]: time="2024-02-09T19:07:57.362893657Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:07:57.364116 env[1311]: time="2024-02-09T19:07:57.364081761Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:07:57.366366 env[1311]: time="2024-02-09T19:07:57.366338468Z" level=info msg="CreateContainer within sandbox \"6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 19:07:57.390271 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount296861071.mount: Deactivated successfully. Feb 9 19:07:57.407284 env[1311]: time="2024-02-09T19:07:57.407241400Z" level=info msg="CreateContainer within sandbox \"6f2c939e061495e7bfd6f3868dc710877ebd2f431347f81573af68ab574c7465\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"dcd97a9c128460fb127f481c83700db1df65762af6eb4f3a9691c54111d8f30f\"" Feb 9 19:07:57.407926 env[1311]: time="2024-02-09T19:07:57.407887902Z" level=info msg="StartContainer for \"dcd97a9c128460fb127f481c83700db1df65762af6eb4f3a9691c54111d8f30f\"" Feb 9 19:07:57.425413 kubelet[1868]: E0209 19:07:57.425385 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:57.428077 systemd[1]: Started cri-containerd-dcd97a9c128460fb127f481c83700db1df65762af6eb4f3a9691c54111d8f30f.scope. Feb 9 19:07:57.459937 kernel: kauditd_printk_skb: 196 callbacks suppressed Feb 9 19:07:57.460057 kernel: audit: type=1400 audit(1707505677.442:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.472269 kernel: audit: type=1400 audit(1707505677.442:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.497086 kernel: audit: type=1400 audit(1707505677.442:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.497174 kernel: audit: type=1400 audit(1707505677.442:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.497211 kernel: audit: type=1400 audit(1707505677.442:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.508901 kernel: audit: type=1400 audit(1707505677.442:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.520435 kernel: audit: type=1400 audit(1707505677.442:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.545837 kernel: audit: type=1400 audit(1707505677.442:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.545938 kernel: audit: type=1400 audit(1707505677.442:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.566858 kernel: audit: type=1400 audit(1707505677.458:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.458000 audit: BPF prog-id=106 op=LOAD Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3011 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:57.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643937613963313238343630666231323766343831633833373030 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3011 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:57.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643937613963313238343630666231323766343831633833373030 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.459000 audit: BPF prog-id=107 op=LOAD Feb 9 19:07:57.459000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000211280 items=0 ppid=3011 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:57.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643937613963313238343630666231323766343831633833373030 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit: BPF prog-id=108 op=LOAD Feb 9 19:07:57.471000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002112c8 items=0 ppid=3011 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:57.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643937613963313238343630666231323766343831633833373030 Feb 9 19:07:57.471000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:07:57.471000 audit: BPF prog-id=107 op=UNLOAD Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:07:57.471000 audit: BPF prog-id=109 op=LOAD Feb 9 19:07:57.471000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002116d8 items=0 ppid=3011 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:57.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643937613963313238343630666231323766343831633833373030 Feb 9 19:07:57.568889 env[1311]: time="2024-02-09T19:07:57.568838018Z" level=info msg="StartContainer for \"dcd97a9c128460fb127f481c83700db1df65762af6eb4f3a9691c54111d8f30f\" returns successfully" Feb 9 19:07:57.795311 kubelet[1868]: I0209 19:07:57.795280 1868 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-j7bvd" podStartSLOduration=-9.223372017059526e+09 pod.CreationTimestamp="2024-02-09 19:07:38 +0000 UTC" firstStartedPulling="2024-02-09 19:07:51.04451558 +0000 UTC m=+54.912899311" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:07:57.795085143 +0000 UTC m=+61.663468874" watchObservedRunningTime="2024-02-09 19:07:57.795248544 +0000 UTC m=+61.663632675" Feb 9 19:07:58.387436 systemd[1]: run-containerd-runc-k8s.io-dcd97a9c128460fb127f481c83700db1df65762af6eb4f3a9691c54111d8f30f-runc.TuFh9X.mount: Deactivated successfully. Feb 9 19:07:58.426173 kubelet[1868]: E0209 19:07:58.426108 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:07:59.426327 kubelet[1868]: E0209 19:07:59.426262 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:00.426709 kubelet[1868]: E0209 19:08:00.426653 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:01.427845 kubelet[1868]: E0209 19:08:01.427780 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:02.002220 kubelet[1868]: I0209 19:08:02.002170 1868 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:08:02.010045 systemd[1]: Created slice kubepods-besteffort-pode7ea0800_ee54_4085_bec5_bc67b8f4946b.slice. Feb 9 19:08:02.016000 audit[3292]: NETFILTER_CFG table=filter:91 family=2 entries=18 op=nft_register_rule pid=3292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:02.016000 audit[3292]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffef3c871f0 a2=0 a3=7ffef3c871dc items=0 ppid=2065 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.016000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:02.022000 audit[3292]: NETFILTER_CFG table=nat:92 family=2 entries=94 op=nft_register_rule pid=3292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:02.022000 audit[3292]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffef3c871f0 a2=0 a3=7ffef3c871dc items=0 ppid=2065 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:02.057000 audit[3320]: NETFILTER_CFG table=filter:93 family=2 entries=30 op=nft_register_rule pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:02.057000 audit[3320]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffc407e4870 a2=0 a3=7ffc407e485c items=0 ppid=2065 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:02.059000 audit[3320]: NETFILTER_CFG table=nat:94 family=2 entries=94 op=nft_register_rule pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:02.059000 audit[3320]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffc407e4870 a2=0 a3=7ffc407e485c items=0 ppid=2065 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:02.125787 kubelet[1868]: I0209 19:08:02.125743 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/e7ea0800-ee54-4085-bec5-bc67b8f4946b-data\") pod \"nfs-server-provisioner-0\" (UID: \"e7ea0800-ee54-4085-bec5-bc67b8f4946b\") " pod="default/nfs-server-provisioner-0" Feb 9 19:08:02.126092 kubelet[1868]: I0209 19:08:02.126063 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q8gvj\" (UniqueName: \"kubernetes.io/projected/e7ea0800-ee54-4085-bec5-bc67b8f4946b-kube-api-access-q8gvj\") pod \"nfs-server-provisioner-0\" (UID: \"e7ea0800-ee54-4085-bec5-bc67b8f4946b\") " pod="default/nfs-server-provisioner-0" Feb 9 19:08:02.314127 env[1311]: time="2024-02-09T19:08:02.313975881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e7ea0800-ee54-4085-bec5-bc67b8f4946b,Namespace:default,Attempt:0,}" Feb 9 19:08:02.428411 kubelet[1868]: E0209 19:08:02.428334 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:02.459897 systemd-networkd[1452]: cali60e51b789ff: Link UP Feb 9 19:08:02.469394 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:08:02.469525 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 19:08:02.474699 systemd-networkd[1452]: cali60e51b789ff: Gained carrier Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.400 [INFO][3323] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.43-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default e7ea0800-ee54-4085-bec5-bc67b8f4946b 1370 0 2024-02-09 19:08:01 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.43 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.43-k8s-nfs--server--provisioner--0-" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.400 [INFO][3323] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.424 [INFO][3335] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" HandleID="k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Workload="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.435 [INFO][3335] ipam_plugin.go 268: Auto assigning IP ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" HandleID="k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Workload="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1c60), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.43", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 19:08:02.424827524 +0000 UTC"}, Hostname:"10.200.8.43", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.435 [INFO][3335] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.435 [INFO][3335] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.435 [INFO][3335] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.43' Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.436 [INFO][3335] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.440 [INFO][3335] ipam.go 372: Looking up existing affinities for host host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.444 [INFO][3335] ipam.go 489: Trying affinity for 192.168.33.192/26 host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.445 [INFO][3335] ipam.go 155: Attempting to load block cidr=192.168.33.192/26 host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.447 [INFO][3335] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.192/26 host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.447 [INFO][3335] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.192/26 handle="k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.448 [INFO][3335] ipam.go 1682: Creating new handle: k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9 Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.451 [INFO][3335] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.192/26 handle="k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.455 [INFO][3335] ipam.go 1216: Successfully claimed IPs: [192.168.33.195/26] block=192.168.33.192/26 handle="k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.455 [INFO][3335] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.195/26] handle="k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" host="10.200.8.43" Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.455 [INFO][3335] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:08:02.486424 env[1311]: 2024-02-09 19:08:02.455 [INFO][3335] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.195/26] IPv6=[] ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" HandleID="k8s-pod-network.b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Workload="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:08:02.487505 env[1311]: 2024-02-09 19:08:02.456 [INFO][3323] k8s.go 385: Populated endpoint ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e7ea0800-ee54-4085-bec5-bc67b8f4946b", ResourceVersion:"1370", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 8, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.33.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:08:02.487505 env[1311]: 2024-02-09 19:08:02.457 [INFO][3323] k8s.go 386: Calico CNI using IPs: [192.168.33.195/32] ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:08:02.487505 env[1311]: 2024-02-09 19:08:02.457 [INFO][3323] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:08:02.487505 env[1311]: 2024-02-09 19:08:02.475 [INFO][3323] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:08:02.488543 env[1311]: 2024-02-09 19:08:02.478 [INFO][3323] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e7ea0800-ee54-4085-bec5-bc67b8f4946b", ResourceVersion:"1370", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 8, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.33.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"12:ed:75:aa:b3:d1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:08:02.488543 env[1311]: 2024-02-09 19:08:02.485 [INFO][3323] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.43-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:08:02.526395 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 19:08:02.526534 kernel: audit: type=1325 audit(1707505682.506:780): table=filter:95 family=2 entries=44 op=nft_register_chain pid=3362 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:08:02.506000 audit[3362]: NETFILTER_CFG table=filter:95 family=2 entries=44 op=nft_register_chain pid=3362 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:08:02.526686 env[1311]: time="2024-02-09T19:08:02.509504287Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:08:02.526686 env[1311]: time="2024-02-09T19:08:02.509538587Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:08:02.526686 env[1311]: time="2024-02-09T19:08:02.509548887Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:08:02.526686 env[1311]: time="2024-02-09T19:08:02.509654887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9 pid=3366 runtime=io.containerd.runc.v2 Feb 9 19:08:02.506000 audit[3362]: SYSCALL arch=c000003e syscall=46 success=yes exit=22352 a0=3 a1=7ffe7cd1b1a0 a2=0 a3=7ffe7cd1b18c items=0 ppid=2615 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.506000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:08:02.554413 systemd[1]: Started cri-containerd-b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9.scope. Feb 9 19:08:02.564764 kernel: audit: type=1300 audit(1707505682.506:780): arch=c000003e syscall=46 success=yes exit=22352 a0=3 a1=7ffe7cd1b1a0 a2=0 a3=7ffe7cd1b18c items=0 ppid=2615 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.564871 kernel: audit: type=1327 audit(1707505682.506:780): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.598495 kernel: audit: type=1400 audit(1707505682.573:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.598602 kernel: audit: type=1400 audit(1707505682.573:782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.611755 kernel: audit: type=1400 audit(1707505682.573:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.624214 kernel: audit: type=1400 audit(1707505682.573:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.624286 kernel: audit: type=1400 audit(1707505682.573:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.658930 kernel: audit: type=1400 audit(1707505682.573:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.676527 kernel: audit: type=1400 audit(1707505682.573:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit: BPF prog-id=110 op=LOAD Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383065333761613163346661353435643935393333636133323430 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383065333761613163346661353435643935393333636133323430 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.597000 audit: BPF prog-id=111 op=LOAD Feb 9 19:08:02.597000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d74b0 items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383065333761613163346661353435643935393333636133323430 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.651000 audit: BPF prog-id=112 op=LOAD Feb 9 19:08:02.651000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d74f8 items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383065333761613163346661353435643935393333636133323430 Feb 9 19:08:02.658000 audit: BPF prog-id=112 op=UNLOAD Feb 9 19:08:02.658000 audit: BPF prog-id=111 op=UNLOAD Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:02.659000 audit: BPF prog-id=113 op=LOAD Feb 9 19:08:02.659000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d7908 items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383065333761613163346661353435643935393333636133323430 Feb 9 19:08:02.701382 env[1311]: time="2024-02-09T19:08:02.701323181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e7ea0800-ee54-4085-bec5-bc67b8f4946b,Namespace:default,Attempt:0,} returns sandbox id \"b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9\"" Feb 9 19:08:02.703178 env[1311]: time="2024-02-09T19:08:02.703102087Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 19:08:03.429293 kubelet[1868]: E0209 19:08:03.429195 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:03.795573 systemd-networkd[1452]: cali60e51b789ff: Gained IPv6LL Feb 9 19:08:04.429848 kubelet[1868]: E0209 19:08:04.429803 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:05.430243 kubelet[1868]: E0209 19:08:05.430166 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:05.451023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount612221522.mount: Deactivated successfully. Feb 9 19:08:06.430601 kubelet[1868]: E0209 19:08:06.430525 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:07.430991 kubelet[1868]: E0209 19:08:07.430913 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:08.431421 kubelet[1868]: E0209 19:08:08.431348 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:09.431761 kubelet[1868]: E0209 19:08:09.431700 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:09.618808 env[1311]: time="2024-02-09T19:08:09.618738160Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:08:09.808161 env[1311]: time="2024-02-09T19:08:09.808105023Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:08:09.863806 env[1311]: time="2024-02-09T19:08:09.863743389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:08:09.868847 env[1311]: time="2024-02-09T19:08:09.868784704Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 19:08:09.869871 env[1311]: time="2024-02-09T19:08:09.869776307Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:08:09.873643 env[1311]: time="2024-02-09T19:08:09.872096014Z" level=info msg="CreateContainer within sandbox \"b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 19:08:09.957351 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1229180874.mount: Deactivated successfully. Feb 9 19:08:10.432773 kubelet[1868]: E0209 19:08:10.432709 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:11.115742 env[1311]: time="2024-02-09T19:08:11.115670695Z" level=info msg="CreateContainer within sandbox \"b680e37aa1c4fa545d95933ca3240a523668b169d37fab2139877334c19553d9\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"5c34d7b3134add8476e81a2af1d8df8b6994fc8afe2c4b47dd7be8737bd5d4f8\"" Feb 9 19:08:11.116921 env[1311]: time="2024-02-09T19:08:11.116874599Z" level=info msg="StartContainer for \"5c34d7b3134add8476e81a2af1d8df8b6994fc8afe2c4b47dd7be8737bd5d4f8\"" Feb 9 19:08:11.146099 systemd[1]: run-containerd-runc-k8s.io-5c34d7b3134add8476e81a2af1d8df8b6994fc8afe2c4b47dd7be8737bd5d4f8-runc.vL1WqB.mount: Deactivated successfully. Feb 9 19:08:11.149306 systemd[1]: Started cri-containerd-5c34d7b3134add8476e81a2af1d8df8b6994fc8afe2c4b47dd7be8737bd5d4f8.scope. Feb 9 19:08:11.181954 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 9 19:08:11.182121 kernel: audit: type=1400 audit(1707505691.160:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.196502 kernel: audit: type=1400 audit(1707505691.160:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.212406 kernel: audit: type=1400 audit(1707505691.160:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.240383 kernel: audit: type=1400 audit(1707505691.160:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.240496 kernel: audit: type=1400 audit(1707505691.160:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.254024 kernel: audit: type=1400 audit(1707505691.160:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.255464 kernel: audit: type=1400 audit(1707505691.160:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.258832 env[1311]: time="2024-02-09T19:08:11.258789117Z" level=info msg="StartContainer for \"5c34d7b3134add8476e81a2af1d8df8b6994fc8afe2c4b47dd7be8737bd5d4f8\" returns successfully" Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.282463 kernel: audit: type=1400 audit(1707505691.160:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.296404 kernel: audit: type=1400 audit(1707505691.160:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.314561 kernel: audit: type=1400 audit(1707505691.164:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.164000 audit: BPF prog-id=114 op=LOAD Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3366 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333464376233313334616464383437366538316132616631643864 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3366 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333464376233313334616464383437366538316132616631643864 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.165000 audit: BPF prog-id=115 op=LOAD Feb 9 19:08:11.165000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d4220 items=0 ppid=3366 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333464376233313334616464383437366538316132616631643864 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit: BPF prog-id=116 op=LOAD Feb 9 19:08:11.178000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d4268 items=0 ppid=3366 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333464376233313334616464383437366538316132616631643864 Feb 9 19:08:11.178000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:08:11.178000 audit: BPF prog-id=115 op=UNLOAD Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:11.178000 audit: BPF prog-id=117 op=LOAD Feb 9 19:08:11.178000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d4678 items=0 ppid=3366 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333464376233313334616464383437366538316132616631643864 Feb 9 19:08:11.272000 audit[3438]: AVC avc: denied { search } for pid=3438 comm="rpcbind" name="crypto" dev="proc" ino=26544 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:08:11.272000 audit[3438]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb4222fc0c0 a2=0 a3=0 items=0 ppid=3420 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 key=(null) Feb 9 19:08:11.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 19:08:11.433657 kubelet[1868]: E0209 19:08:11.433524 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:11.508000 audit[3443]: AVC avc: denied { search } for pid=3443 comm="dbus-daemon" name="crypto" dev="proc" ino=26544 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:08:11.508000 audit[3443]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0fe42380c0 a2=0 a3=0 items=0 ppid=3420 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 key=(null) Feb 9 19:08:11.508000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:08:11.511000 audit[3444]: AVC avc: denied { watch } for pid=3444 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c285,c967 tclass=dir permissive=0 Feb 9 19:08:11.511000 audit[3444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56399f331d30 a2=2c8 a3=7ffdf1d6e02c items=0 ppid=3420 pid=3444 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 key=(null) Feb 9 19:08:11.511000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:08:11.651000 audit[3445]: AVC avc: denied { read } for pid=3445 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=27660 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 19:08:11.651000 audit[3445]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fea1055f320 a1=80000 a2=d a3=7ffc58c3ba00 items=0 ppid=3420 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 key=(null) Feb 9 19:08:11.651000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:08:11.652000 audit[3445]: AVC avc: denied { search } for pid=3445 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26544 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:08:11.652000 audit[3445]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fea0fab30c0 a2=0 a3=0 items=0 ppid=3420 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c967 key=(null) Feb 9 19:08:11.652000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:08:11.826137 kubelet[1868]: I0209 19:08:11.826095 1868 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372026028711e+09 pod.CreationTimestamp="2024-02-09 19:08:01 +0000 UTC" firstStartedPulling="2024-02-09 19:08:02.702807586 +0000 UTC m=+66.571191217" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:08:11.826031987 +0000 UTC m=+75.694415618" watchObservedRunningTime="2024-02-09 19:08:11.826064287 +0000 UTC m=+75.694448018" Feb 9 19:08:11.879000 audit[3474]: NETFILTER_CFG table=filter:96 family=2 entries=18 op=nft_register_rule pid=3474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:11.879000 audit[3474]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc7a2e63a0 a2=0 a3=7ffc7a2e638c items=0 ppid=2065 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:11.884000 audit[3474]: NETFILTER_CFG table=nat:97 family=2 entries=178 op=nft_register_chain pid=3474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:11.884000 audit[3474]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffc7a2e63a0 a2=0 a3=7ffc7a2e638c items=0 ppid=2065 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:12.434643 kubelet[1868]: E0209 19:08:12.434556 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:13.435514 kubelet[1868]: E0209 19:08:13.435453 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:14.436427 kubelet[1868]: E0209 19:08:14.436357 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:15.436714 kubelet[1868]: E0209 19:08:15.436663 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:16.384933 kubelet[1868]: E0209 19:08:16.384877 1868 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:16.437190 kubelet[1868]: E0209 19:08:16.437127 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:17.438477 kubelet[1868]: E0209 19:08:17.438334 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:18.438856 kubelet[1868]: E0209 19:08:18.438795 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:19.439868 kubelet[1868]: E0209 19:08:19.439806 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:20.440307 kubelet[1868]: E0209 19:08:20.440242 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:20.890865 systemd[1]: run-containerd-runc-k8s.io-b8620f662e91be34a5c0677e86efd491d66580b6a2ccbf6b7f345e7dd9415e86-runc.yKRfI9.mount: Deactivated successfully. Feb 9 19:08:21.440541 kubelet[1868]: E0209 19:08:21.440478 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:22.441560 kubelet[1868]: E0209 19:08:22.441492 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:23.442516 kubelet[1868]: E0209 19:08:23.442453 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:24.443504 kubelet[1868]: E0209 19:08:24.443450 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:25.443719 kubelet[1868]: E0209 19:08:25.443647 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:26.443979 kubelet[1868]: E0209 19:08:26.443924 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:27.444241 kubelet[1868]: E0209 19:08:27.444172 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:28.444812 kubelet[1868]: E0209 19:08:28.444752 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:29.445258 kubelet[1868]: E0209 19:08:29.445195 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:30.445742 kubelet[1868]: E0209 19:08:30.445682 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:31.446207 kubelet[1868]: E0209 19:08:31.446149 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:32.447114 kubelet[1868]: E0209 19:08:32.447046 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:33.447352 kubelet[1868]: E0209 19:08:33.447294 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:34.448317 kubelet[1868]: E0209 19:08:34.448249 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:35.449249 kubelet[1868]: E0209 19:08:35.449186 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:36.384810 kubelet[1868]: E0209 19:08:36.384746 1868 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:36.450236 kubelet[1868]: E0209 19:08:36.450180 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:36.818140 kubelet[1868]: I0209 19:08:36.818088 1868 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:08:36.824479 systemd[1]: Created slice kubepods-besteffort-pod7f599beb_620a_4371_a761_fde08821756c.slice. Feb 9 19:08:36.942415 kubelet[1868]: I0209 19:08:36.942339 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xmj65\" (UniqueName: \"kubernetes.io/projected/7f599beb-620a-4371-a761-fde08821756c-kube-api-access-xmj65\") pod \"test-pod-1\" (UID: \"7f599beb-620a-4371-a761-fde08821756c\") " pod="default/test-pod-1" Feb 9 19:08:36.942753 kubelet[1868]: I0209 19:08:36.942724 1868 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-93f9e8de-ddfd-4189-b9eb-5f8bb129f94d\" (UniqueName: \"kubernetes.io/nfs/7f599beb-620a-4371-a761-fde08821756c-pvc-93f9e8de-ddfd-4189-b9eb-5f8bb129f94d\") pod \"test-pod-1\" (UID: \"7f599beb-620a-4371-a761-fde08821756c\") " pod="default/test-pod-1" Feb 9 19:08:37.151941 kernel: Failed to create system directory netfs Feb 9 19:08:37.152106 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 19:08:37.152135 kernel: audit: type=1400 audit(1707505717.141:824): avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.152167 kernel: Failed to create system directory netfs Feb 9 19:08:37.141000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.170702 kernel: audit: type=1400 audit(1707505717.141:824): avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.170813 kernel: Failed to create system directory netfs Feb 9 19:08:37.141000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.189224 kernel: audit: type=1400 audit(1707505717.141:824): avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.189321 kernel: Failed to create system directory netfs Feb 9 19:08:37.141000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.141000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.208282 kernel: audit: type=1400 audit(1707505717.141:824): avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.141000 audit[3528]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557a198a35e0 a1=153bc a2=557a181c72b0 a3=5 items=0 ppid=457 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:37.141000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:08:37.250591 kernel: audit: type=1300 audit(1707505717.141:824): arch=c000003e syscall=175 success=yes exit=0 a0=557a198a35e0 a1=153bc a2=557a181c72b0 a3=5 items=0 ppid=457 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:37.250682 kernel: audit: type=1327 audit(1707505717.141:824): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:08:37.277689 kernel: Failed to create system directory fscache Feb 9 19:08:37.277815 kernel: audit: type=1400 audit(1707505717.255:825): avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.277845 kernel: Failed to create system directory fscache Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.296556 kernel: audit: type=1400 audit(1707505717.255:825): avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.296669 kernel: Failed to create system directory fscache Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.314834 kernel: audit: type=1400 audit(1707505717.255:825): avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.314952 kernel: Failed to create system directory fscache Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.333448 kernel: audit: type=1400 audit(1707505717.255:825): avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.333566 kernel: Failed to create system directory fscache Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.344767 kernel: Failed to create system directory fscache Feb 9 19:08:37.344850 kernel: Failed to create system directory fscache Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.351463 kernel: Failed to create system directory fscache Feb 9 19:08:37.351539 kernel: Failed to create system directory fscache Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.358294 kernel: Failed to create system directory fscache Feb 9 19:08:37.358348 kernel: Failed to create system directory fscache Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.364598 kernel: Failed to create system directory fscache Feb 9 19:08:37.364658 kernel: Failed to create system directory fscache Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.255000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.370753 kernel: Failed to create system directory fscache Feb 9 19:08:37.374396 kernel: FS-Cache: Loaded Feb 9 19:08:37.255000 audit[3528]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557a19ab89c0 a1=4c0fc a2=557a181c72b0 a3=5 items=0 ppid=457 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:37.255000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.448604 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.448673 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.448696 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.450951 kubelet[1868]: E0209 19:08:37.450921 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.454952 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.455022 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.463310 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.463396 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.469213 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.469270 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.475079 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.475135 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.480747 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.480806 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.486459 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.486515 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.492003 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.492061 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.495431 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.500195 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.500257 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.505467 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.505515 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.510630 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.510686 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.515977 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.516032 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.521082 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.521138 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.530093 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.530152 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.530174 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.535135 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.535196 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.537727 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.542569 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.544994 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.545044 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.548717 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.551646 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.555638 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.555690 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.560430 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.560480 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.565403 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.565457 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.570154 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.570203 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.574846 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.574896 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.580960 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.581014 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.585569 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.585617 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.590066 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.590111 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.595126 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.595172 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.599849 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.599902 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.604561 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.604607 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.609515 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.609568 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.614463 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.614522 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.619333 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.619703 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.622143 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.626787 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.626842 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.631480 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.631534 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.636146 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.636196 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.641052 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.641088 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.645856 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.645906 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.650429 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.651391 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.655435 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.655475 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.660637 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.663430 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.665935 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.668337 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.673243 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.673297 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.673320 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.678080 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.678128 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.683003 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.683050 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.687860 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.687897 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.694052 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.694101 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.699930 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.699993 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.702099 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.709216 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.709269 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.714408 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.714453 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.719920 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.719970 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.724240 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.724294 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.729034 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.729089 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.733131 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.734016 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.739067 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.739116 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.743938 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.743987 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.748676 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.748722 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.754230 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.754983 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.759388 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.759447 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.764319 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.769627 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.769679 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.769711 kernel: Failed to create system directory sunrpc Feb 9 19:08:37.429000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:37.783791 kernel: RPC: Registered named UNIX socket transport module. Feb 9 19:08:37.783849 kernel: RPC: Registered udp transport module. Feb 9 19:08:37.783884 kernel: RPC: Registered tcp transport module. Feb 9 19:08:37.786102 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 19:08:37.429000 audit[3528]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557a19b04ad0 a1=1588c4 a2=557a181c72b0 a3=5 items=6 ppid=457 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:37.429000 audit: CWD cwd="/" Feb 9 19:08:37.429000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:08:37.429000 audit: PATH item=1 name=(null) inode=27400 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:08:37.429000 audit: PATH item=2 name=(null) inode=27400 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:08:37.429000 audit: PATH item=3 name=(null) inode=27401 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:08:37.429000 audit: PATH item=4 name=(null) inode=27400 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:08:37.429000 audit: PATH item=5 name=(null) inode=27402 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:08:37.429000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.119784 kernel: Failed to create system directory nfs Feb 9 19:08:38.119871 kernel: Failed to create system directory nfs Feb 9 19:08:38.119895 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.124495 kernel: Failed to create system directory nfs Feb 9 19:08:38.124555 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.127671 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.131611 kernel: Failed to create system directory nfs Feb 9 19:08:38.131670 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.136470 kernel: Failed to create system directory nfs Feb 9 19:08:38.136521 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.141231 kernel: Failed to create system directory nfs Feb 9 19:08:38.141280 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.146024 kernel: Failed to create system directory nfs Feb 9 19:08:38.146079 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.149383 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.153357 kernel: Failed to create system directory nfs Feb 9 19:08:38.153415 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.158037 kernel: Failed to create system directory nfs Feb 9 19:08:38.158108 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.162542 kernel: Failed to create system directory nfs Feb 9 19:08:38.162604 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.167112 kernel: Failed to create system directory nfs Feb 9 19:08:38.167173 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.174049 kernel: Failed to create system directory nfs Feb 9 19:08:38.174098 kernel: Failed to create system directory nfs Feb 9 19:08:38.174126 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.179992 kernel: Failed to create system directory nfs Feb 9 19:08:38.180050 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.184778 kernel: Failed to create system directory nfs Feb 9 19:08:38.184842 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.189536 kernel: Failed to create system directory nfs Feb 9 19:08:38.189596 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.194224 kernel: Failed to create system directory nfs Feb 9 19:08:38.194284 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.200088 kernel: Failed to create system directory nfs Feb 9 19:08:38.200141 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.204834 kernel: Failed to create system directory nfs Feb 9 19:08:38.204909 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.209361 kernel: Failed to create system directory nfs Feb 9 19:08:38.209440 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.214262 kernel: Failed to create system directory nfs Feb 9 19:08:38.214317 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.219326 kernel: Failed to create system directory nfs Feb 9 19:08:38.219392 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.222425 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.226381 kernel: Failed to create system directory nfs Feb 9 19:08:38.226430 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.228840 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.231187 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.233407 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.235560 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.237857 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.240135 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.244951 kernel: Failed to create system directory nfs Feb 9 19:08:38.244991 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.249631 kernel: Failed to create system directory nfs Feb 9 19:08:38.249680 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.254247 kernel: Failed to create system directory nfs Feb 9 19:08:38.254294 kernel: Failed to create system directory nfs Feb 9 19:08:38.106000 audit[3528]: AVC avc: denied { confidentiality } for pid=3528 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.270389 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 19:08:38.106000 audit[3528]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557a19ca7680 a1=e29dc a2=557a181c72b0 a3=5 items=0 ppid=457 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:38.106000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.334502 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.334604 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.335443 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.340188 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.340239 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.344800 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.344853 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.349555 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.349603 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.354332 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.354397 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.359140 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.359178 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.363744 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.363787 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.368675 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.371152 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.373671 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.374413 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.378541 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.378592 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.383150 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.383203 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.388269 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.393286 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.393347 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.393388 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.398169 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.398215 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.403240 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.403290 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.408254 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.408308 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.412862 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.412912 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.417497 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.417545 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.424001 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.424049 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.426720 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.431331 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.431385 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.436384 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.436425 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.441435 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.441506 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.449279 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.449345 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.451436 kubelet[1868]: E0209 19:08:38.451387 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.454362 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.454423 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.459052 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.459114 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.463909 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.463958 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.468673 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.468711 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.473504 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.473581 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.478136 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.478209 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.480768 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.485815 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.485869 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.490614 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.490675 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.493706 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.497882 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.497934 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.502829 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.505222 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.505278 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.509934 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.509971 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.514727 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.514767 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.519270 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.519320 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.524000 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.524049 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.528510 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.528561 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.534900 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.534954 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.540148 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.540198 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.542396 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.545578 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.550120 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.550174 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.554851 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.554892 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.559418 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.559464 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.315000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.564331 kernel: Failed to create system directory nfs4 Feb 9 19:08:38.712536 kernel: NFS: Registering the id_resolver key type Feb 9 19:08:38.712705 kernel: Key type id_resolver registered Feb 9 19:08:38.712738 kernel: Key type id_legacy registered Feb 9 19:08:38.315000 audit[3533]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fd884372010 a1=1d3cc4 a2=55ff5ebf42b0 a3=5 items=0 ppid=457 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:38.315000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.739457 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.739531 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.744542 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.744620 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.749452 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.749525 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.754619 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.754677 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.759437 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.759488 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.764236 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.764293 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.769403 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.769466 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.774291 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.774350 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.778935 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.778989 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.785683 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.785751 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.791120 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.791182 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.795970 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.796034 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.733000 audit[3534]: AVC avc: denied { confidentiality } for pid=3534 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:08:38.803449 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.803552 kernel: Failed to create system directory rpcgss Feb 9 19:08:38.733000 audit[3534]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f048c491010 a1=4f524 a2=5557ab4032b0 a3=5 items=0 ppid=457 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:38.733000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 19:08:38.972719 nfsidmap[3543]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-bfd6d81330' Feb 9 19:08:38.989495 nfsidmap[3544]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-bfd6d81330' Feb 9 19:08:38.997000 audit[1411]: AVC avc: denied { watch_reads } for pid=1411 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:08:38.997000 audit[1411]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e64928b970 a2=10 a3=c86f7f2aaa6081d0 items=0 ppid=1 pid=1411 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:38.997000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:08:38.997000 audit[1411]: AVC avc: denied { watch_reads } for pid=1411 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:08:38.997000 audit[1411]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e64928b970 a2=10 a3=c86f7f2aaa6081d0 items=0 ppid=1 pid=1411 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:38.997000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:08:38.997000 audit[1411]: AVC avc: denied { watch_reads } for pid=1411 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:08:38.997000 audit[1411]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e64928b970 a2=10 a3=c86f7f2aaa6081d0 items=0 ppid=1 pid=1411 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:38.997000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:08:38.998000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:08:38.998000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:08:38.998000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:08:39.229248 env[1311]: time="2024-02-09T19:08:39.229099151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:7f599beb-620a-4371-a761-fde08821756c,Namespace:default,Attempt:0,}" Feb 9 19:08:39.371426 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:08:39.371553 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 19:08:39.365346 systemd-networkd[1452]: cali5ec59c6bf6e: Link UP Feb 9 19:08:39.372133 systemd-networkd[1452]: cali5ec59c6bf6e: Gained carrier Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.302 [INFO][3546] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.43-k8s-test--pod--1-eth0 default 7f599beb-620a-4371-a761-fde08821756c 1471 0 2024-02-09 19:08:03 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.43 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.43-k8s-test--pod--1-" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.302 [INFO][3546] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.43-k8s-test--pod--1-eth0" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.328 [INFO][3557] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" HandleID="k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Workload="10.200.8.43-k8s-test--pod--1-eth0" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.340 [INFO][3557] ipam_plugin.go 268: Auto assigning IP ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" HandleID="k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Workload="10.200.8.43-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c56f0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.43", "pod":"test-pod-1", "timestamp":"2024-02-09 19:08:39.328605512 +0000 UTC"}, Hostname:"10.200.8.43", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.340 [INFO][3557] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.340 [INFO][3557] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.340 [INFO][3557] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.43' Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.342 [INFO][3557] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.345 [INFO][3557] ipam.go 372: Looking up existing affinities for host host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.349 [INFO][3557] ipam.go 489: Trying affinity for 192.168.33.192/26 host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.350 [INFO][3557] ipam.go 155: Attempting to load block cidr=192.168.33.192/26 host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.352 [INFO][3557] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.192/26 host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.352 [INFO][3557] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.192/26 handle="k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.353 [INFO][3557] ipam.go 1682: Creating new handle: k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643 Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.356 [INFO][3557] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.192/26 handle="k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.360 [INFO][3557] ipam.go 1216: Successfully claimed IPs: [192.168.33.196/26] block=192.168.33.192/26 handle="k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.360 [INFO][3557] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.196/26] handle="k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" host="10.200.8.43" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.360 [INFO][3557] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.360 [INFO][3557] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.196/26] IPv6=[] ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" HandleID="k8s-pod-network.84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Workload="10.200.8.43-k8s-test--pod--1-eth0" Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.362 [INFO][3546] k8s.go 385: Populated endpoint ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.43-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"7f599beb-620a-4371-a761-fde08821756c", ResourceVersion:"1471", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 8, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:08:39.387578 env[1311]: 2024-02-09 19:08:39.362 [INFO][3546] k8s.go 386: Calico CNI using IPs: [192.168.33.196/32] ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.43-k8s-test--pod--1-eth0" Feb 9 19:08:39.388683 env[1311]: 2024-02-09 19:08:39.362 [INFO][3546] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.43-k8s-test--pod--1-eth0" Feb 9 19:08:39.388683 env[1311]: 2024-02-09 19:08:39.373 [INFO][3546] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.43-k8s-test--pod--1-eth0" Feb 9 19:08:39.388683 env[1311]: 2024-02-09 19:08:39.373 [INFO][3546] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.43-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.43-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"7f599beb-620a-4371-a761-fde08821756c", ResourceVersion:"1471", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 8, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.43", ContainerID:"84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"b6:d5:9e:70:b9:34", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:08:39.388683 env[1311]: 2024-02-09 19:08:39.380 [INFO][3546] k8s.go 491: Wrote updated endpoint to datastore ContainerID="84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.43-k8s-test--pod--1-eth0" Feb 9 19:08:39.396000 audit[3573]: NETFILTER_CFG table=filter:98 family=2 entries=34 op=nft_register_chain pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:08:39.396000 audit[3573]: SYSCALL arch=c000003e syscall=46 success=yes exit=17876 a0=3 a1=7ffef0aa19a0 a2=0 a3=7ffef0aa198c items=0 ppid=2615 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:39.396000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:08:39.407792 env[1311]: time="2024-02-09T19:08:39.407720333Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:08:39.407792 env[1311]: time="2024-02-09T19:08:39.407755333Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:08:39.407792 env[1311]: time="2024-02-09T19:08:39.407768834Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:08:39.408219 env[1311]: time="2024-02-09T19:08:39.408162040Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643 pid=3586 runtime=io.containerd.runc.v2 Feb 9 19:08:39.423725 systemd[1]: Started cri-containerd-84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643.scope. Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit: BPF prog-id=118 op=LOAD Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:39.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663532353132393665623234653164653663366530636331333039 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:39.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663532353132393665623234653164653663366530636331333039 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.437000 audit: BPF prog-id=119 op=LOAD Feb 9 19:08:39.437000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e79e0 items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:39.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663532353132393665623234653164653663366530636331333039 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit: BPF prog-id=120 op=LOAD Feb 9 19:08:39.438000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e7a28 items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:39.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663532353132393665623234653164653663366530636331333039 Feb 9 19:08:39.438000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:08:39.438000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { perfmon } for pid=3596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit[3596]: AVC avc: denied { bpf } for pid=3596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:39.438000 audit: BPF prog-id=121 op=LOAD Feb 9 19:08:39.438000 audit[3596]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001e7e38 items=0 ppid=3586 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:39.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663532353132393665623234653164653663366530636331333039 Feb 9 19:08:39.452157 kubelet[1868]: E0209 19:08:39.452100 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:39.469096 env[1311]: time="2024-02-09T19:08:39.469049357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:7f599beb-620a-4371-a761-fde08821756c,Namespace:default,Attempt:0,} returns sandbox id \"84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643\"" Feb 9 19:08:39.470786 env[1311]: time="2024-02-09T19:08:39.470755685Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:08:40.059129 env[1311]: time="2024-02-09T19:08:40.059076494Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:08:40.067571 env[1311]: time="2024-02-09T19:08:40.067515733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:08:40.073471 env[1311]: time="2024-02-09T19:08:40.073430531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:08:40.079721 env[1311]: time="2024-02-09T19:08:40.079678334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:08:40.080383 env[1311]: time="2024-02-09T19:08:40.080336945Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:08:40.082550 env[1311]: time="2024-02-09T19:08:40.082518881Z" level=info msg="CreateContainer within sandbox \"84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 19:08:40.116094 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1158804655.mount: Deactivated successfully. Feb 9 19:08:40.124246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4292321441.mount: Deactivated successfully. Feb 9 19:08:40.138140 env[1311]: time="2024-02-09T19:08:40.138088897Z" level=info msg="CreateContainer within sandbox \"84f5251296eb24e1de6c6e0cc1309523fbe969364761b497f1fa8d5639387643\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"120ce03466a8b125af69479575bcf83b776050a4a12476b5ccfc9301d6525b09\"" Feb 9 19:08:40.138944 env[1311]: time="2024-02-09T19:08:40.138856510Z" level=info msg="StartContainer for \"120ce03466a8b125af69479575bcf83b776050a4a12476b5ccfc9301d6525b09\"" Feb 9 19:08:40.154737 systemd[1]: Started cri-containerd-120ce03466a8b125af69479575bcf83b776050a4a12476b5ccfc9301d6525b09.scope. Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.171000 audit: BPF prog-id=122 op=LOAD Feb 9 19:08:40.171000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.171000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:40.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306365303334363661386231323561663639343739353735626366 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:40.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306365303334363661386231323561663639343739353735626366 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit: BPF prog-id=123 op=LOAD Feb 9 19:08:40.172000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020f6d0 items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:40.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306365303334363661386231323561663639343739353735626366 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit: BPF prog-id=124 op=LOAD Feb 9 19:08:40.172000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020f718 items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:40.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306365303334363661386231323561663639343739353735626366 Feb 9 19:08:40.172000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:08:40.172000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:08:40.172000 audit: BPF prog-id=125 op=LOAD Feb 9 19:08:40.172000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020fb28 items=0 ppid=3586 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:40.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306365303334363661386231323561663639343739353735626366 Feb 9 19:08:40.190843 env[1311]: time="2024-02-09T19:08:40.190791767Z" level=info msg="StartContainer for \"120ce03466a8b125af69479575bcf83b776050a4a12476b5ccfc9301d6525b09\" returns successfully" Feb 9 19:08:40.453165 kubelet[1868]: E0209 19:08:40.453038 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:41.107792 systemd-networkd[1452]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 19:08:41.454152 kubelet[1868]: E0209 19:08:41.453940 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:42.455157 kubelet[1868]: E0209 19:08:42.455099 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:43.455666 kubelet[1868]: E0209 19:08:43.455509 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:44.456780 kubelet[1868]: E0209 19:08:44.456712 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:45.457928 kubelet[1868]: E0209 19:08:45.457868 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:46.458800 kubelet[1868]: E0209 19:08:46.458742 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:47.459884 kubelet[1868]: E0209 19:08:47.459814 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:48.460472 kubelet[1868]: E0209 19:08:48.460405 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:49.460954 kubelet[1868]: E0209 19:08:49.460893 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:50.461457 kubelet[1868]: E0209 19:08:50.461401 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:50.890012 systemd[1]: run-containerd-runc-k8s.io-b8620f662e91be34a5c0677e86efd491d66580b6a2ccbf6b7f345e7dd9415e86-runc.NyOP6N.mount: Deactivated successfully. Feb 9 19:08:51.462096 kubelet[1868]: E0209 19:08:51.462033 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:52.463174 kubelet[1868]: E0209 19:08:52.463108 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:53.464354 kubelet[1868]: E0209 19:08:53.464288 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:54.464853 kubelet[1868]: E0209 19:08:54.464794 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:55.465780 kubelet[1868]: E0209 19:08:55.465719 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:56.385259 kubelet[1868]: E0209 19:08:56.385202 1868 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:56.466492 kubelet[1868]: E0209 19:08:56.466446 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:57.466810 kubelet[1868]: E0209 19:08:57.466748 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:58.467615 kubelet[1868]: E0209 19:08:58.467550 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:08:59.468313 kubelet[1868]: E0209 19:08:59.468234 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:00.468944 kubelet[1868]: E0209 19:09:00.468882 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:01.007516 kubelet[1868]: E0209 19:09:01.007445 1868 controller.go:189] failed to update lease, error: Put "https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.43?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:09:01.461918 kubelet[1868]: E0209 19:09:01.458708 1868 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.8.43\": Get \"https://10.200.8.36:6443/api/v1/nodes/10.200.8.43?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 19:09:01.469910 kubelet[1868]: E0209 19:09:01.469875 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:02.470604 kubelet[1868]: E0209 19:09:02.470537 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:03.471072 kubelet[1868]: E0209 19:09:03.471013 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:04.471972 kubelet[1868]: E0209 19:09:04.471910 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:05.472174 kubelet[1868]: E0209 19:09:05.472115 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:06.473385 kubelet[1868]: E0209 19:09:06.473306 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:07.473521 kubelet[1868]: E0209 19:09:07.473455 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:08.474259 kubelet[1868]: E0209 19:09:08.474203 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:09.475365 kubelet[1868]: E0209 19:09:09.475305 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:10.475927 kubelet[1868]: E0209 19:09:10.475862 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:11.008516 kubelet[1868]: E0209 19:09:11.008417 1868 controller.go:189] failed to update lease, error: Put "https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.43?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:09:11.459157 kubelet[1868]: E0209 19:09:11.459003 1868 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.8.43\": Get \"https://10.200.8.36:6443/api/v1/nodes/10.200.8.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 19:09:11.476361 kubelet[1868]: E0209 19:09:11.476308 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:12.477035 kubelet[1868]: E0209 19:09:12.476978 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:13.477158 kubelet[1868]: E0209 19:09:13.477104 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:14.477388 kubelet[1868]: E0209 19:09:14.477317 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:15.477656 kubelet[1868]: E0209 19:09:15.477593 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:16.384668 kubelet[1868]: E0209 19:09:16.384615 1868 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:16.478334 kubelet[1868]: E0209 19:09:16.478265 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:16.955807 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.979563 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.979902 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#296 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.980094 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#118 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.980255 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.980426 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#89 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.980572 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#90 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.989638 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#93 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.989888 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#97 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.999520 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#95 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:16.999775 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.009654 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#96 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.009903 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#100 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.015609 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#98 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.020647 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#101 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.025621 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#103 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.030538 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#102 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.035790 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#105 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.040666 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#104 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.045628 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#94 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.050931 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.056622 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#107 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.061558 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#106 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.067928 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#109 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.072734 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#108 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.077522 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#111 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.088799 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#110 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.093642 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.098771 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#112 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.103558 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#115 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.108451 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#113 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.127027 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#112 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.127258 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#113 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.131886 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#297 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.136764 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#299 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.141539 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#298 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.146754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#115 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.151512 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.156401 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#300 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.161293 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#110 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.166339 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#108 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.171071 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#301 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.176284 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#302 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.181027 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#303 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.185827 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#106 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.191553 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#111 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.196433 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#107 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.201024 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.205655 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#304 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.210444 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#305 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.215220 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#306 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.220065 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#94 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.224895 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#307 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.234583 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#104 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.234792 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#109 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.239529 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#308 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.244526 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#105 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.249390 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#102 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.254455 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#103 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.259283 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#309 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.264094 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#101 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.268834 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#98 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.274287 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#100 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.279023 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#96 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.283667 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#310 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.288984 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#95 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.293827 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.298672 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#311 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.305034 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#97 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.309815 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#93 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.314604 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#90 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.319424 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#313 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.324574 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#312 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.329520 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.334573 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#89 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.339469 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#118 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.344360 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#256 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.349354 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#315 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.354070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.358984 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.363756 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#259 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.368878 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#257 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.373600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.378477 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#258 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.383568 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.388327 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#262 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.392940 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#264 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.398030 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#266 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.402880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#263 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.407646 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#265 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.413940 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#267 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.418704 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#296 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.423554 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#269 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.433460 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#268 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.433677 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.438222 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#271 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.443031 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#272 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.448140 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#274 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.452955 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#273 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.457610 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#275 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.462606 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#276 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.467273 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#277 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.472146 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#278 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.476992 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#279 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.479349 kubelet[1868]: E0209 19:09:17.479293 1868 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:09:17.481893 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#282 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.486625 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#280 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.492074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#281 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.502453 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#284 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.502673 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#283 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.507632 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#286 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.513063 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#287 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.518476 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#288 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.524728 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#285 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.529637 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#290 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.534402 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#289 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.539257 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#291 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.543877 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#292 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.548768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#293 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.553486 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#294 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.558206 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#314 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.567634 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#25 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.567848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.572605 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.577176 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#295 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.582030 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.586800 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.591511 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.596190 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.601057 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.606164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.610784 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.615359 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#35 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.620127 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#36 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.624664 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#38 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.629281 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#39 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.635893 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#40 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.640579 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#43 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.645303 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#41 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.650553 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#42 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.655260 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#44 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.660020 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#45 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.664760 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#46 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.669947 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#47 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.674970 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#49 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.679905 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#48 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.684584 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#50 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.689258 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#37 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.706411 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#49 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.706626 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.711213 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#37 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.716034 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#50 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.720737 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#48 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:09:17.725557 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001